INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:83236c00 r4:83236c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fca480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520338c r4:85203000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520338c r4:830b8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236c00 r8:830b852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:80287e08 r7:df83de60 r6:830b8600 r5:83236c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b51c0 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/0:2:47 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df921d84 r8:00000002 r7:60000113 r6:df921d8c r5:833d6c00 r4:833d6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833d6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cb7c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:833d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4822000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85202b8c r4:85202800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85202b8c r4:8332f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833d6c00 r8:8332f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8332f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8332f780 r8:80287e08 r7:df83de60 r6:8332f800 r5:833d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8332bf40 INFO: task kworker/0:2:47 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:1:51 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:51 tgid:51 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df931d84 r8:00000002 r7:60000113 r6:df931d8c r5:8335e000 r4:8335e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8335e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df931e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2fa80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8335e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aa678c r4:85aa6400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa678c r4:8329e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8335e000 r8:8329e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8329e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8329e400 r8:80287e08 r7:df879e60 r6:8329e480 r5:8335e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf931fb0 to 0xdf931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8329a640 INFO: task kworker/1:1:51 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/0:3:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e9d84 r8:00000002 r7:60000113 r6:ec6e9d8c r5:8442b000 r4:8442b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8442b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f53980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8442b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e889d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85203b8c r4:85203800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85203b8c r4:8478cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8442b000 r8:8478cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cf00 r8:80287e08 r7:df841e60 r6:8478cd80 r5:8442b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84770080 INFO: task kworker/0:3:3118 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:6:3126 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e5d84 r8:00000002 r7:60000013 r6:df9e5d8c r5:83244800 r4:83244800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a1a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb81000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843b938c r4:843b9000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843b938c r4:83ae6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:83ae62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6280 r8:80287e08 r7:df9dde60 r6:8478cb80 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84720a40 INFO: task kworker/1:6:3126 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:7:3128 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:8442ec00 r4:8442ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8442ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fdd040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8442ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd7b8c r4:84dd7800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd7b8c r4:83ae6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8442ec00 r8:83ae622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6200 r8:80287e08 r7:df9e5e60 r6:8478cb00 r5:8442ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84720d80 INFO: task kworker/1:7:3128 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:8:3130 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:83243c00 r4:83243c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83243c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e26c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff93000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843b978c r4:843b9400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843b978c r4:83ae6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:83ae61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6180 r8:80287e08 r7:df9e5e60 r6:8478c780 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84720d80 INFO: task kworker/1:8:3130 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:9:3132 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:8412e000 r4:8412e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8412e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ed40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8412e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa15000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514bb8c r4:8514b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514bb8c r4:83ae6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8412e000 r8:83ae612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6100 r8:80287e08 r7:dfa0de60 r6:8478c600 r5:8412e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84765140 INFO: task kworker/1:9:3132 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:10:3133 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:8412a400 r4:8412a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8412a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85188600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8412a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85148b8c r4:85148800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85148b8c r4:83ae6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8412a400 r8:83ae60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6080 r8:80287e08 r7:dfa25e60 r6:8478c580 r5:8412a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84765140 INFO: task kworker/1:10:3133 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:11:3135 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df969d84 r8:00000002 r7:60000113 r6:df969d8c r5:8417c800 r4:8417c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8417c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df969e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185fc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8417c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514a38c r4:8514a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514a38c r4:83ae6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8417c800 r8:83ae602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6000 r8:80287e08 r7:dfa25e60 r6:83ae6380 r5:8417c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf969fb0 to 0xdf969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84765100 INFO: task kworker/1:11:3135 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3139 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:838b4800 r4:838b4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838b4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:838b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc19000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85170f8c r4:85170c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85170f8c r4:83ae6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b4800 r8:83ae632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6300 r8:80287e08 r7:dfa25e60 r6:8478c180 r5:838b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847654c0 INFO: task kworker/1:12:3139 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3141 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9add84 r8:00000002 r7:60000113 r6:df9add8c r5:8417b000 r4:8417b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8417b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2fcc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8417b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aa738c r4:85aa7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa738c r4:83ae6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8417b000 r8:83ae65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6580 r8:80287e08 r7:dfa49e60 r6:83ae6880 r5:8417b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9adfb0 to 0xdf9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847654c0 INFO: task kworker/1:13:3141 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:84129800 r4:84129800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84129800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc0c40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84129800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd37000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843ba78c r4:843ba400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843ba78c r4:83ae6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84129800 r8:83ae662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6600 r8:80287e08 r7:df9ade60 r6:83ae6c00 r5:84129800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847654c0 INFO: task kworker/1:14:3142 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:838b3000 r4:838b3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838b3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472d0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:838b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85203f8c r4:85203c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85203f8c r4:8478ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b3000 r8:8478ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ce80 r8:80287e08 r7:ec6e9e60 r6:84711180 r5:838b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84770140 INFO: task kworker/0:4:3146 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3147 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83236000 r4:83236000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84713340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b338c r4:853b3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b338c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa2de60 r6:830b8400 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84770dc0 INFO: task kworker/0:5:3147 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3148 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:84408000 r4:84408000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84408000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb0a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84408000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2f8c r4:853b2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2f8c r4:83bd1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84408000 r8:83bd1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83bd1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bd1d80 r8:80287e08 r7:dfa6de60 r6:842ab900 r5:84408000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84770dc0 INFO: task kworker/0:6:3148 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3150 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa79d84 r8:00000002 r7:60000013 r6:dfa79d8c r5:83b2e000 r4:83b2e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850acbc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533d38c r4:8533d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533d38c r4:83ae6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2e000 r8:83ae6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae6b00 r8:80287e08 r7:df9ade60 r6:83ae6f80 r5:83b2e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847658c0 INFO: task kworker/1:15:3150 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3153 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa85d84 r8:00000002 r7:60000013 r6:dfa85d8c r5:83b28c00 r4:83b28c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b28c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da5900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b3f8c r4:853b3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3f8c r4:8422eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b28c00 r8:8422ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8422eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8422eb80 r8:80287e08 r7:dfa6de60 r6:83ae6c80 r5:83b28c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701340 INFO: task kworker/0:7:3153 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3156 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:83b2a400 r4:83b2a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb7880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549ab8c r4:8549a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549ab8c r4:832b2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2a400 r8:832b202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832b2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832b2000 r8:80287e08 r7:dfa85e60 r6:83ae6a80 r5:83b2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847014c0 INFO: task kworker/0:8:3156 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3158 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:83b2bc00 r4:83b2bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846f5e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf81000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549938c r4:85499000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549938c r4:832b2a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2bc00 r8:832b2aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832b2a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832b2a80 r8:80287e08 r7:dfaade60 r6:83ae6e80 r5:83b2bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701580 INFO: task kworker/0:9:3158 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3161 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:83b2d400 r4:83b2d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553838c r4:85538000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553838c r4:84361d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2d400 r8:84361d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84361d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84361d00 r8:80287e08 r7:dfaade60 r6:83ae6e00 r5:83b2d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701700 INFO: task kworker/0:10:3161 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3162 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83b28000 r4:83b28000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b28000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b28000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556a38c r4:8556a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556a38c r4:84361c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b28000 r8:84361cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84361c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84361c80 r8:80287e08 r7:dfad1e60 r6:83ae6f00 r5:83b28000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701840 INFO: task kworker/0:11:3162 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3164 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:8417d400 r4:8417d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8417d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c7600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8417d400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf97000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556bb8c r4:8556b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556bb8c r4:830cc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8417d400 r8:830cc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc400 r8:80287e08 r7:dfad5e60 r6:8427ae00 r5:8417d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701a40 INFO: task kworker/0:12:3164 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3165 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:833ebc00 r4:833ebc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833ebc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b4ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:833ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556ab8c r4:8556a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556ab8c r4:830cc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833ebc00 r8:830cc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc380 r8:80287e08 r7:dfae1e60 r6:841a5280 r5:833ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701c00 INFO: task kworker/0:13:3165 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3168 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83b33000 r4:83b33000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b33000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b33000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb213000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85912b8c r4:85912800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85912b8c r4:830cc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b33000 r8:830cc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc300 r8:80287e08 r7:dfae1e60 r6:841a5200 r5:83b33000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701d00 INFO: task kworker/0:14:3168 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3169 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83b30000 r4:83b30000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b30000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b30000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ec978c r4:84ec9400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ec978c r4:830cc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b30000 r8:830cc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc280 r8:80287e08 r7:dfb05e60 r6:8329ef00 r5:83b30000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701d40 INFO: task kworker/0:15:3169 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3171 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83b31800 r4:83b31800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b31800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85660680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b31800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559cb8c r4:8559c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559cb8c r4:8446f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b31800 r8:8446f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8446f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8446f380 r8:80287e08 r7:dfb05e60 r6:8329ee80 r5:83b31800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701ec0 INFO: task kworker/0:16:3171 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3172 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:833eb000 r4:833eb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833eb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570ba40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:833eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84eca38c r4:84eca000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84eca38c r4:83ba3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833eb000 r8:83ba3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ba3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ba3e00 r8:80287e08 r7:df9ade60 r6:832c5280 r5:833eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d8e2c0 INFO: task kworker/1:16:3172 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3174 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:83b5d400 r4:83b5d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b5d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85713400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559df8c r4:8559dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559df8c r4:8446f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b5d400 r8:8446f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8446f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8446f100 r8:80287e08 r7:dfb05e60 r6:84796000 r5:83b5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701d80 INFO: task kworker/0:17:3174 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3176 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83b58c00 r4:83b58c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b58c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e338c r4:856e3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e338c r4:8446f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b58c00 r8:8446f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8446f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8446f400 r8:80287e08 r7:dfb05e60 r6:84796080 r5:83b58c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701040 INFO: task kworker/0:18:3176 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3179 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83b5a400 r4:83b5a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b5a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84701c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85704b8c r4:85704800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85704b8c r4:8446f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b5a400 r8:8446f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8446f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8446f180 r8:80287e08 r7:dfb05e60 r6:84796100 r5:83b5a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470b040 INFO: task kworker/0:19:3179 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:84126000 r4:84126000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84126000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587c700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84126000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb907000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85929f8c r4:85929c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85929f8c r4:8446f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84126000 r8:8446f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8446f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8446f680 r8:80287e08 r7:dfb05e60 r6:84796180 r5:84126000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470b180 INFO: task kworker/0:20:3181 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3183 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:84122400 r4:84122400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84122400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a1ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84122400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570638c r4:85706000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8570638c r4:8478cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84122400 r8:8478cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cf80 r8:80287e08 r7:dfb05e60 r6:84796200 r5:84122400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470b200 INFO: task kworker/0:21:3183 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:838c3000 r4:838c3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838c3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a7100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:838c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570778c r4:85707400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8570778c r4:8474a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838c3000 r8:8474a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474a000 r8:80287e08 r7:dfb05e60 r6:84796280 r5:838c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470b3c0 INFO: task kworker/0:22:3185 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:838c6c00 r4:838c6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838c6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ccec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:838c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591138c r4:85911000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591138c r4:8474a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838c6c00 r8:8474a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474a080 r8:80287e08 r7:dfb05e60 r6:84796300 r5:838c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470b500 INFO: task kworker/0:23:3187 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83b36000 r4:83b36000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b36000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9d400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b36000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbfb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ecdf8c r4:84ecdc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ecdf8c r4:8474a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b36000 r8:8474a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474a100 r8:80287e08 r7:dfb05e60 r6:84796380 r5:83b36000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470b640 INFO: task kworker/0:24:3189 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3190 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:84010000 r4:84010000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84010000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2fb00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84010000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aa6b8c r4:85aa6800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa6b8c r4:84796400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84010000 r8:8479642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84796400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84796400 r8:80287e08 r7:df9ade60 r6:84796480 r5:84010000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d8ef80 INFO: task kworker/1:17:3190 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred dd20: de239000 edded000 00000001 80239b98 7f2f1000 00000001 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:84011800 r4:84011800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84011800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8470b8c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84011800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ecc38c r4:84ecc000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ecc38c r4:8474a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84011800 r8:8474a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfbadfb0 to 0xdfbadff8) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r10:8291a684 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84013000 r4:00000000 r5:84ecc78c r4:84ecc400 Exception stack(0xdfbbdfb0 to 0xdfbbdff8) [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:e007ddc0 r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3196 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:84012400 r4:84012400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84012400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8e1c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84012400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84012400 r8:8474a2ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84010c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:84ecd38c r4:84ecd000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84010c00 r8:8474a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a300 r10:00000000 r9:8474a300 r8:80287e08 r7:dfb99e60 r6:84796680 r5:84010c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8470bb40 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3200 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:84013c00 r4:84013c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84013c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472c100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84013c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ecd78c r4:84ecd400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ecd78c r4:8474a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84013c00 r8:8474a3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474a380 r8:80287e08 r7:dfb99e60 r6:84796700 r5:84013c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 r5:00001000 r4:e002d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe007dfb0 to 0xe007dff8) Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84ecdb8c r4:8474a400 r10:00000000 r9:8474a400 r8:80287e08 r7:dfb99e60 r6:84796780 r5:84014800 r4:8470bd00 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r5:00001000 r4:e002d000 r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84016c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84016c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9dc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84016c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb527000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ecbb8c r4:84ecb800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ecbb8c r4:8474a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84016c00 r8:8474a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474a500 r8:80287e08 r7:dfb99e60 r6:84796800 r5:84016c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d8ea40 INFO: task kworker/0:31:3204 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e1761000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3206 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc25d84 r8:00000002 r7:60000013 r6:dfc25d8c r5:84016000 r4:84016000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84016000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b9d700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84016000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ece38c r4:84ece000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ece38c r4:8474a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84016000 r8:8474a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474a580 r8:80287e08 r7:dfc15e60 r6:84796880 r5:84016000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 dd20: e1d54000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:84e30000 r4:84e30000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e30000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f66540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84e30000 r7:00000000 r6:83018000 r5:00001000 r4:7f237000 r5:85de7f8c r4:85de7c00 r10:61c88647 r9:84e30000 r8:8474a62c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe007dd28 to 0xe007dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 Exception stack(0xe007dfb0 to 0xe007dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84408c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85de7b8c r4:85de7800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de7b8c r4:8474a680 r4:8474a680 Exception stack(0xdfb21fb0 to 0xdfb21ff8) task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80070013 ffffffff r4:e007ddc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:83b1d400 r4:8291a680 r4:00000000 r5:85aa7b8c r4:85aa7800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e2a8a000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3216 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:83b1b000 r4:83b1b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85aa778c r4:85aa7400 r10:61c88647 r9:83b1b000 r8:84796a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 INFO: task kworker/0:35:3218 blocked for more than 451 seconds. r4:8440c800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8440c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 r5:85c8a78c r4:85c8a400 r10:61c88647 r9:8440c800 r8:8474a8ac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:84fc4040 task:kworker/1:20 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83b18c00 r4:83b18c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b18c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2ffc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf21000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aa7f8c r4:85aa7c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa7f8c r4:84796a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b18c00 r8:84796aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84796a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84796a80 r8:80287e08 r7:df9e1e60 r6:8474a980 r5:83b18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472f900 INFO: task kworker/1:20:3219 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e3060000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3221 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84ce0c00 r4:84ce0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73040 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85aac78c r4:85aac400 r7:ddde2d80 r6:83018200 r5:85aac78c r4:84796b00 r4:84796b00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e34fa000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3224 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:84ce2400 r4:84ce2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2a480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ce2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf2d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aac38c r4:85aac000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84796b80 r8:80287e08 r7:dfc49e60 r6:8474aa80 r5:84ce2400 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e34fa000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3227 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85aacb8c r4:85aac800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ce0000 r8:84796c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: e3921000 edded000 00000001 80239b98 7f2f1000 00000001 r4:e007ddc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe007dfb0 to 0xe007dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000013 r6:dfc65d8c r5:84ce1800 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec56f000 r5:85aaef8c r4:85aaec00 r7:ddde2d80 r6:83018200 r5:85aaef8c r4:84796c80 r10:00000000 r9:84796c80 r8:80287e08 r7:dfc5de60 r6:8474ac80 r5:84ce1800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472fd80 INFO: task kworker/1:24:3229 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e3921000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3231 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:84ce3c00 r4:84ce3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ce3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:85aad38c r4:85aad000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aad38c r4:84796d00 r4:84796d00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: e3921000 edded000 00000001 80239b98 7f2f1000 00000001 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85aad78c r4:85aad400 r7:ddde2d80 r6:83018200 r5:85aad78c r4:84796d80 r10:00000000 r9:84796d80 r8:80287e08 r7:dfc65e60 r6:8474ad80 r5:84ce6000 r4:84720600 Workqueue: events bpf_prog_free_deferred dd20: e433a000 edded000 00000001 80239b98 7f2f1000 00000001 r4:e007ddc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe007dfb0 to 0xe007dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc95d84 r8:00000002 r7:60000113 r6:dfc95d8c r5:84ce5400 r4:84ce5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ce5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb569000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aadb8c r4:85aad800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aadb8c r4:84796e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce5400 r8:84796e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84796e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84796e00 r8:80287e08 r7:dfc65e60 r6:8474ae00 r5:84ce5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8470be80 INFO: task kworker/1:27:3235 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e433a000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 task:kworker/1:28 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85aadf8c r4:85aadc00 r4:84796e80 Exception stack(0xdfca5fb0 to 0xdfca5ff8) task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80070013 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84dd738c r4:84dd7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b738c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ce6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb817000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aae38c r4:85aae000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aae38c r4:84796f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce6c00 r8:84796f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84796f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84796f00 r8:80287e08 r7:dfc65e60 r6:8474af00 r5:84ce6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847602c0 INFO: task kworker/1:29:3239 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e4688000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3241 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:847e8c00 r4:847e8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847e8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b739c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb959000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aae78c r4:85aae400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aae78c r4:84796f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847e8c00 r8:84796fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dd20: e4b87000 edded000 00000001 80239b98 7f2f1000 00000001 r5:00001000 r4:e002d000 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3243 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:847e8000 r4:847e8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847e8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb59000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aaeb8c r4:85aae800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aaeb8c r4:84793080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847e8000 r8:847930ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793080 r8:80287e08 r7:dfc65e60 r6:84d91000 r5:847e8000 r4:00000001 r4:84760300 Exception stack(0xe007dd28 to 0xe007dd70) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847eb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aaf38c r4:85aaf000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aaf38c r4:84793180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847eb000 r8:847931ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793180 r8:80287e08 r7:dfc65e60 r6:84d91080 r5:847eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce5fb0 to 0xdfce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84760700 INFO: task kworker/1:32:3245 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e4fe4000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3247 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf5d84 r8:00000002 r7:60000013 r6:dfcf5d8c r5:847ea400 r4:847ea400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847ea400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab238c r4:85ab2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab238c r4:84793200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847ea400 r8:8479322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793200 r8:80287e08 r7:dfce5e60 r6:84d91100 r5:847ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84dd738c r4:84dd7000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85aaf78c r4:85aaf400 r10:61c88647 r9:847e9800 r8:847932ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe007dd28 to 0xe007dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb180 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:35 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r9:83018205 r8:847ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:85aafb8c r4:85aaf800 r10:61c88647 r9:847ebc00 r8:8479332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793300 r8:80287e08 r7:dfcf5e60 r6:84d91200 r5:847ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84760780 INFO: task kworker/1:35:3251 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3253 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd25d84 r8:00000002 r7:60000113 r6:dfd25d8c r5:847ec800 r4:847ec800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847ec800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73fc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aaff8c r4:85aafc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aaff8c r4:84793380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847ec800 r8:847933ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85ab038c r4:84793400 r10:00000000 r9:84793400 r8:80287e08 r7:dfcf5e60 r6:84d91300 r5:847eec00 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac21e4 r5:00001000 r4:e002d000 Exception stack(0xe007dfb0 to 0xe007dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab078c r4:85ab0400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab078c r4:84793480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b18000 r8:847934ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793480 r8:80287e08 r7:dfcf5e60 r6:84d91380 r5:83b18000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84760a40 INFO: task kworker/1:38:3257 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3260 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd59d84 r8:00000002 r7:60000113 r6:dfd59d8c r5:84e40c00 r4:84e40c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e40c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab0b8c r4:85ab0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab0b8c r4:84793500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e40c00 r8:8479352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793500 r8:80287e08 r7:dfcf5e60 r6:84d91400 r5:84e40c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd59fb0 to 0xdfd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84760d00 INFO: task kworker/1:39:3260 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3261 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:84e41800 r4:84e41800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e41800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e41800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec913000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab0f8c r4:85ab0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab0f8c r4:84793580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e41800 r8:847935ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793580 r8:80287e08 r7:dfcf5e60 r6:84d91480 r5:84e41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84760d00 INFO: task kworker/1:40:3261 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 r4:e007ddc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:41 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ab138c r4:85ab1000 r10:61c88647 r9:84e40000 r8:8479362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793600 r8:80287e08 r7:dfcf5e60 r6:84d91500 r5:84e40000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472c480 INFO: task kworker/1:41:3263 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3265 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd85d84 r8:00000002 r7:60000113 r6:dfd85d8c r5:84e42400 r4:84e42400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e42400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b945c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e42400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab178c r4:85ab1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab178c r4:84793680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e42400 r8:847936ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793680 r8:80287e08 r7:dfcf5e60 r6:84d91580 r5:84e42400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd85fb0 to 0xdfd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6040 INFO: task kworker/1:42:3265 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 r4:e007ddc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ecb07000 r5:85ab1b8c r4:85ab1800 r7:ddde2d80 r6:83018200 r5:85ab1b8c r4:84793700 r10:00000000 r9:84793700 r8:80287e08 r7:dfcf5e60 r6:84d91600 r5:84e43000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:00000000 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3269 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdadd84 r8:00000002 r7:60000113 r6:dfdadd8c r5:84e43c00 r4:84e43c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e43c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb19000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab1f8c r4:85ab1c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab1f8c r4:84793780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e43c00 r8:847937ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793780 r8:80287e08 r7:dfcf5e60 r6:84d91680 r5:84e43c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6140 INFO: task kworker/1:44:3269 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3271 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdb5d84 r8:00000002 r7:60000113 r6:dfdb5d8c r5:84e44800 r4:84e44800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e44800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e44800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab2b8c r4:85ab2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab2b8c r4:84793800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e44800 r8:8479382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793800 r8:80287e08 r7:dfcf5e60 r6:84d91700 r5:84e44800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb5fb0 to 0xdfdb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6140 INFO: task kworker/1:45:3271 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3273 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdc5d84 r8:00000002 r7:60000113 r6:dfdc5d8c r5:84e45400 r4:84e45400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e45400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94a00 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ab278c r4:85ab2400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e45400 r8:847938ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe007dd28 to 0xe007dd70) r4:82ac21e4 r4:00000000 r5:00001000 r4:e002d000 r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:47 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85ab2f8c r4:85ab2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab2f8c r4:84793900 r10:61c88647 r9:84e46000 r8:8479392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84da6740 Workqueue: events bpf_prog_free_deferred Exception stack(0xe007dd28 to 0xe007dd70) r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3280 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:847ee000 r4:847ee000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847ee000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab338c r4:85ab3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab338c r4:84793980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847ee000 r8:847939ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793980 r8:80287e08 r7:dfaa9e60 r6:84d91880 r5:847ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6a40 INFO: task kworker/1:48:3280 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e007ddc0 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r4:84fbb180 r4:00000001 Exception stack(0xe007dfb0 to 0xe007dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:49:3281 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:84d10000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85ab3b8c r4:85ab3800 r7:ddde2d80 r6:83018200 r5:85ab3b8c r4:84793a00 r10:61c88647 r9:84d10000 r8:84793a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84793a00 r8:80287e08 r7:dfab5e60 r6:84d91900 r5:84d10000 dfa0: 00000000 00000000 00000000 00000000 r4:84da6a40 task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe007dd28 to 0xe007dd70) dd60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3284 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:84d11800 r4:84d11800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d11800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d11800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc13000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab3f8c r4:85ab3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab3f8c r4:84793b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d11800 r8:84793b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793b00 r8:80287e08 r7:dfadde60 r6:84d91a00 r5:84d11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6980 INFO: task kworker/1:51:3284 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3287 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84d13c00 r4:84d13c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d13c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b94b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab438c r4:85ab4000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab438c r4:84793b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d13c00 r8:84793bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793b80 r8:80287e08 r7:dfadde60 r6:84d91a80 r5:84d13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6b80 INFO: task kworker/1:52:3287 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3288 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:84d12400 r4:84d12400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d12400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f66680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d12400 r7:00000000 r6:83018000 r5:00001000 r4:7f239000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edac9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dec38c r4:85dec000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dec38c r4:84d91b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d12400 r8:84d91b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91b00 r8:80287e08 r7:dfc59e60 r6:84d91b80 r5:84d12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c9a640 INFO: task kworker/0:37:3288 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3290 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3290 tgid:3290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb41d84 r8:00000002 r7:60000013 r6:dfb41d8c r5:84d15400 r4:84d15400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d15400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8470b900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d15400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccfd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab478c r4:85ab4400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab478c r4:84793c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d15400 r8:84793c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84793c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84793c00 r8:80287e08 r7:dfadde60 r6:84d91c00 r5:84d15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da6e00 INFO: task kworker/1:53:3290 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f66780 r5:85dec78c r4:85dec400 r10:00000000 r9:84d91c80 r8:80287e08 r7:dfc59e60 r6:84d91d00 r5:84d14800 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe007dfb0 to 0xe007dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:91:3653 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:91 state:D stack:0 pid:3653 tgid:3653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:844d0000 r4:844d0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fdd740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd538c r4:84dd5000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd538c r4:84fbb100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d0000 r8:84fbb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb100 r8:80287e08 r7:e0055e60 r6:84fbc880 r5:844d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0079fb0 to 0xe0079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 INFO: task kworker/1:91:3653 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:3660 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e009dd84 r8:00000002 r7:60000113 r6:e009dd8c r5:844d5400 r4:844d5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fa000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca3f8c r4:84ca3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca3f8c r4:84fbcb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d5400 r8:84fbcbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcb80 r8:80287e08 r7:e0085e60 r6:84fbcc00 r5:844d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe009dfb0 to 0xe009dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 INFO: task kworker/0:180:3660 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:e00a9d84 r8:00000002 r7:60000013 r6:e00a9d8c r5:844d4800 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred Exception stack(0xe007dd28 to 0xe007dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:93:3664 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:93 state:D stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00c9d84 r8:00000002 r7:60000113 r6:e00c9d8c r5:844d6c00 r4:844d6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84dd778c r4:84dd7400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd778c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 INFO: task kworker/1:93:3664 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e007ddc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:94:3666 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:94 state:D stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00e9d84 r8:00000002 r7:60000113 r6:e00e9d8c r5:844c8000 r4:844c8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fdd600 r5:00001000 r4:dfd87000 r5:84dd7f8c r4:84dd7c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844c8000 r8:84fbb2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe00e9fb0 to 0xe00e9ff8) r4:84fc4240 Workqueue: events bpf_prog_free_deferred dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 r4:e007ddc0 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:844c9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03fde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8700 r5:84ca338c r4:84ca3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844c9800 r8:84fbceac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe03fdfb0 to 0xe03fdff8) r4:84fc8200 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80070013 ffffffff r4:e007ddc0 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe007dfb0 to 0xe007dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:e00ddd84 r8:00000002 r7:60000113 r6:e00ddd8c r5:844ca400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc87c0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca378c r4:84ca3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca378c r4:84fbcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ca400 r8:84fbcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcf80 r8:80287e08 r7:e009de60 r6:84fb9000 r5:844ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00ddfb0 to 0xe00ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc8680 INFO: task kworker/0:183:3670 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:3673 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:3673 tgid:3673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84ca3b8c r4:84ca3800 r10:61c88647 r9:844cb000 r8:84fb90ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 r5:84dd738c r4:84dd7000 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:3675 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:3675 tgid:3675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0409d84 r8:00000002 r7:60000113 r6:e0409d8c r5:844cbc00 r4:844cbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844cbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0409e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0527000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cb078c r4:84cb0400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cb078c r4:84fb9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cbc00 r8:84fb91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9180 r8:80287e08 r7:e009de60 r6:84fb9200 r5:844cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0409fb0 to 0xe0409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc88c0 INFO: task kworker/0:185:3675 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) Exception stack(0xe007dfb0 to 0xe007dff8) Call trace: r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0415000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cb038c r4:84cb0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cb038c r4:84fb9280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cc800 r8:84fb92ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9280 r8:80287e08 r7:e0409e60 r6:84fb9300 r5:844cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc8a80 INFO: task kworker/0:186:3676 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:187 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84cb0f8c r4:84cb0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fb9380 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 r4:e007ddc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:844ce000 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e0533000 r5:84cb0b8c r4:84cb0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fb9480 Exception stack(0xe0531fb0 to 0xe0531ff8) task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r5:84dd738c r4:84dd7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3682 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:3682 tgid:3682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0525d84 r8:00000002 r7:60000113 r6:e0525d8c r5:844cec00 r4:844cec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844cec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcb300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cb138c r4:84cb1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cb138c r4:84fb9580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cec00 r8:84fb95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9580 r8:80287e08 r7:e0425e60 r6:84fb9600 r5:844cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0525fb0 to 0xe0525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc8d40 INFO: task kworker/0:189:3682 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:e007ddc0 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:844d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cb1b8c r4:84cb1800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cb1b8c r4:84fb9680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d2400 r8:84fb96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9680 r8:80287e08 r7:e0525e60 r6:84fb9700 r5:844d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe056dfb0 to 0xe056dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcb0c0 INFO: task kworker/0:190:3684 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e007ddc0 r5:84dd738c r4:84dd7000 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cb178c r4:84cb1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cb178c r4:84fb9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8c00 r8:84fb97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fcb2c0 dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84ec1800 r4:8291a680 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:84ec1800 r8:84fb98ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3691 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3691 tgid:3691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05a9d84 r8:00000002 r7:60000013 r6:e05a9d8c r5:84ec3000 r4:84ec3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a9e08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:84ec3000 r8:84fb99ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe007dd28 to 0xe007dd70) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r5:84cb278c r4:84cb2400 r10:61c88647 r9:84ec0000 r8:84fb9aac r7:82804d40 r6:dddced80 r5:dddceda0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:3695 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:84ff0000 r4:84ff0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r5:84cb2b8c r4:84cb2800 r10:61c88647 r9:84ff0000 r8:84fb9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9b80 r8:80287e08 r7:e05b5e60 r6:84fbb300 r5:84ff0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05bdfb0 to 0xe05bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcbb80 INFO: task kworker/0:195:3695 is blocked on a mutex likely owned by task kworker/1:92:3654. r4:e007ddc0 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:84cb2f8c r4:84cb2c00 r10:61c88647 r9:84ff2400 r8:84fb9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 Exception stack(0xe007dfb0 to 0xe007dff8) r10:8291a684 r9:e05d9d84 r8:00000002 r7:60000013 r6:e05d9d8c r5:84ff3c00 r9:83018005 r8:84ff3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 r10:61c88647 r9:84ff3c00 r8:84fb9cac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcbc40 INFO: task kworker/0:197:3699 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:84cb378c r4:84cb3400 r10:61c88647 r9:84ff3000 r8:84fb9d2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd2080 INFO: task kworker/0:198:3701 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e556f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 Exception stack(0xe007dfb0 to 0xe007dff8) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0429e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd25c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ff4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8505c38c r4:8505c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505c38c r4:84fb9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ff4800 r8:84fb9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9d80 r8:80287e08 r7:dffd5e60 r6:84fbb500 r5:84ff4800 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:e002d000 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 Call trace: [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ff6000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df999000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cb3b8c r4:84cb3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cb3b8c r4:84fb9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ff6000 r8:84fb9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9e00 r8:80287e08 r7:e0429e60 r6:84fbb580 r5:84ff6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0441fb0 to 0xe0441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe007dd28 to 0xe007dd70) dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 r5:84cb3f8c r4:84cb3c00 r10:61c88647 r9:84ff5400 r8:84fb9eac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:202 state:D stack:0 pid:3708 tgid:3708 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ff6c00 r8:84fb9f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fb9f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb9f00 r8:80287e08 r7:e0429e60 r6:84fbb680 r5:84ff6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a1fb0 to 0xe04a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd23c0 INFO: task kworker/0:202:3708 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 task:kworker/0:203 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8505cb8c r4:84fb9f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80070013 ffffffff [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:204:3713 blocked for more than 452 seconds. [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8505cf8c r4:8505cc00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2cc0 r5:8505d78c r4:8505d400 Exception stack(0xe04f9fb0 to 0xe04f9ff8) Exception stack(0xe007dd28 to 0xe007dd70) r5:00001000 r4:e002d000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ff8000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8505d38c r4:84fd6100 r4:84fd2a80 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 r4:84fbb180 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2dc0 r10:61c88647 r9:84ff8c00 r8:84fd61ac r7:82804d40 r6:dddced80 r5:dddceda0 dd60: 80230ad0 80239bb0 80070013 ffffffff [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/0:208:3722 blocked for more than 452 seconds. [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ffa400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8505eb8c r4:8505e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505eb8c r4:84fd6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffa400 r8:84fd622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6200 r8:80287e08 r7:e05e9e60 r6:84fbb980 r5:84ffa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05edfb0 to 0xe05edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd2bc0 INFO: task kworker/0:208:3722 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8505df8c r4:8505dc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:dddced80 r6:83018000 r5:8505e38c r4:84fd6300 r10:00000000 r9:84fd6300 r8:80287e08 r7:e05ede60 r6:84fbba80 r5:84ff9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f9fb0 to 0xe05f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd2f40 INFO: task kworker/0:210:3725 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80070013 ffffffff [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Call trace: [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:8505e78c r4:84fd6380 Workqueue: events bpf_prog_free_deferred r4:e007ddc0 r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ffd400 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84720e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ffd400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843b8f8c r4:843b8c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843b8f8c r4:84fbbb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffd400 r8:84fbbbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbbb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbbb80 r8:80287e08 r7:e0079e60 r6:84fbbc00 r5:84ffd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f1fb0 to 0xe05f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fdd5c0 INFO: task kworker/1:95:3729 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:96:3731 blocked for more than 452 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104040 r10:00000000 r9:84fbbc80 r8:80287e08 r7:e05f1e60 r6:84fbbd00 r5:84ffe000 dd60: 80230ad0 80239bb0 80070013 ffffffff r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ffec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfefb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8505ef8c r4:8505ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505ef8c r4:84fd6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffec00 r8:84fd642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6400 r8:80287e08 r7:e05ede60 r6:84fbbd80 r5:84ffec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0609fb0 to 0xe0609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4400 r10:61c88647 r9:85000c00 r8:84fd64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6480 r8:80287e08 r7:e0609e60 r6:84fbbe00 r5:85000c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4100 INFO: task kworker/0:213:3736 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 Exception stack(0xe007dfb0 to 0xe007dff8) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8505f78c r4:8505f400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e007ddc0 r5:84dd738c r4:84dd7000 Exception stack(0xe007dfb0 to 0xe007dff8) Workqueue: events bpf_prog_free_deferred [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85060f8c r4:85060c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85060f8c r4:84fd6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85003000 r8:84fd65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6580 r8:80287e08 r7:e0615e60 r6:84fbbf00 r5:85003000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0621fb0 to 0xe0621ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r5:00001000 r4:e002d000 r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3741 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85003c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85003c00 r8:84fd662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6600 r8:80287e08 r7:e0621e60 r6:84fbbf80 r5:85003c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd43c0 INFO: task kworker/0:216:3741 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3743 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0631d84 r8:00000002 r7:60000013 r6:e0631d8c r5:85000000 r4:85000000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85000000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85000000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8505ff8c r4:8505fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505ff8c r4:84fd6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85000000 r8:84fd66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6680 r8:80287e08 r7:e0621e60 r6:85096000 r5:85000000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4580 INFO: task kworker/0:217:3743 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3745 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3745 tgid:3745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:85002400 r4:85002400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85002400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85002400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff87000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506038c r4:85060000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506038c r4:84fd6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85002400 r8:84fd672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6700 r8:80287e08 r7:e0621e60 r6:85096080 r5:85002400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd46c0 INFO: task kworker/0:218:3745 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3747 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3747 tgid:3747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:85006000 r5:85006000 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85006000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506078c r4:85060400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506078c r4:84fd6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85006000 r8:84fd67ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6780 r8:80287e08 r7:e0621e60 r6:85096100 r5:85006000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4740 INFO: task kworker/0:219:3747 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:3749 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:3749 tgid:3749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0649d84 r8:00000002 r7:60000113 r6:e0649d8c r5:85006c00 r4:85006c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85006c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85006c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffab000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85060b8c r4:85060800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85060b8c r4:84fd6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85006c00 r8:84fd682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6800 r8:80287e08 r7:e0621e60 r6:85096180 r5:85006c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4900 INFO: task kworker/0:220:3749 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:3752 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0655d84 r8:00000002 r7:60000013 r6:e0655d8c r5:85004800 r4:85004800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85004800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc37c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85004800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0435000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506238c r4:85062000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506238c r4:84fd6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85004800 r8:84fd68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6880 r8:80287e08 r7:e0621e60 r6:85096200 r5:85004800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0655fb0 to 0xe0655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4a00 INFO: task kworker/0:221:3752 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3753 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0659d84 r8:00000002 r7:60000013 r6:e0659d8c r5:85008000 r4:85008000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85008000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85008000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506138c r4:85061000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506138c r4:84fd6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85008000 r8:84fd692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6900 r8:80287e08 r7:e0655e60 r6:85096280 r5:85008000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4d40 INFO: task kworker/0:222:3753 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3755 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:85009800 r4:85009800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85009800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd4f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85009800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0007000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506178c r4:85061400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506178c r4:84fd6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85009800 r8:84fd69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6980 r8:80287e08 r7:e0655e60 r6:85096300 r5:85009800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4c00 INFO: task kworker/0:223:3755 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:3757 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:85008c00 r4:85008c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85008c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85008c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85061b8c r4:85061800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85061b8c r4:84fd6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85008c00 r8:84fd6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6a00 r8:80287e08 r7:e0655e60 r6:85096380 r5:85008c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4d80 INFO: task kworker/0:224:3757 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:3759 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:3759 tgid:3759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:8500bc00 r4:8500bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fddd00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85061f8c r4:85061c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85061f8c r4:84fd6a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500bc00 r8:84fd6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6a80 r8:80287e08 r7:e0655e60 r6:85096400 r5:8500bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fd4f00 INFO: task kworker/0:225:3759 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:3761 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0679d84 r8:00000002 r7:60000013 r6:e0679d8c r5:8500b000 r4:8500b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0461000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506278c r4:85062400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506278c r4:84fd6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500b000 r8:84fd6b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6b00 r8:80287e08 r7:e0655e60 r6:85096480 r5:8500b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fdd240 INFO: task kworker/0:226:3761 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3763 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0681d84 r8:00000002 r7:60000013 r6:e0681d8c r5:8500a400 r4:8500a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0495000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85062f8c r4:85062c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85062f8c r4:84fd6b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500a400 r8:84fd6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6b80 r8:80287e08 r7:e0679e60 r6:85096500 r5:8500a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0681fb0 to 0xe0681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3600 INFO: task kworker/0:227:3763 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3765 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0685d84 r8:00000002 r7:60000113 r6:e0685d8c r5:8500d400 r4:8500d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0479000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85062b8c r4:85062800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85062b8c r4:84fd6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500d400 r8:84fd6c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6c00 r8:80287e08 r7:e0681e60 r6:85096580 r5:8500d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7100 INFO: task kworker/0:228:3765 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:3768 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:3768 tgid:3768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:8500c800 r4:8500c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506338c r4:85063000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506338c r4:84fd6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500c800 r8:84fd6cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6c80 r8:80287e08 r7:e0681e60 r6:85096600 r5:8500c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a71c0 INFO: task kworker/0:229:3768 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:3770 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:84ffb000 r4:84ffb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a79c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ffb000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85064b8c r4:85064800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85064b8c r4:84fd6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffb000 r8:84fd6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6d00 r8:80287e08 r7:e0691e60 r6:85096680 r5:84ffb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7480 INFO: task kworker/0:230:3770 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3771 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e069dd84 r8:00000002 r7:60000113 r6:e069dd8c r5:8500ec00 r4:8500ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506378c r4:85063400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506378c r4:84fd6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500ec00 r8:84fd6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6d80 r8:80287e08 r7:e0699e60 r6:85096700 r5:8500ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7480 INFO: task kworker/0:231:3771 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3773 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:3773 tgid:3773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:8500e000 r4:8500e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8500e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0501000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85063b8c r4:85063800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85063b8c r4:84fd6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500e000 r8:84fd6e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6e00 r8:80287e08 r7:e0699e60 r6:85096780 r5:8500e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7580 INFO: task kworker/0:232:3773 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:3775 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:85010c00 r4:85010c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85010c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85010c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85063f8c r4:85063c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85063f8c r4:84fd6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85010c00 r8:84fd6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6e80 r8:80287e08 r7:e0699e60 r6:85096800 r5:85010c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00bdfb0 to 0xe00bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7600 INFO: task kworker/0:233:3775 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:3777 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:85010000 r4:85010000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85010000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85010000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa75000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506438c r4:85064000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506438c r4:84fd6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85010000 r8:84fd6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6f00 r8:80287e08 r7:e0699e60 r6:85096880 r5:85010000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a77c0 INFO: task kworker/0:234:3777 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:3779 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0549d84 r8:00000002 r7:60000113 r6:e0549d8c r5:85011800 r4:85011800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85011800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85011800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506478c r4:85064400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506478c r4:84fd6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85011800 r8:84fd6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fd6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd6f80 r8:80287e08 r7:e0699e60 r6:85096900 r5:85011800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a78c0 INFO: task kworker/0:235:3779 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:3782 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0585d84 r8:00000002 r7:60000113 r6:e0585d8c r5:85012400 r4:85012400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85012400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcbfc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85012400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe83000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506578c r4:85065400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506578c r4:850b6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85012400 r8:850b602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6000 r8:80287e08 r7:e0699e60 r6:85096980 r5:85012400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0585fb0 to 0xe0585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7b80 INFO: task kworker/0:236:3782 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3783 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0591d84 r8:00000002 r7:60000013 r6:e0591d8c r5:85013c00 r4:85013c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85013c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85013c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85064f8c r4:85064c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85064f8c r4:850b6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85013c00 r8:850b60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6080 r8:80287e08 r7:e0585e60 r6:85096a00 r5:85013c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0591fb0 to 0xe0591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7b80 INFO: task kworker/0:237:3783 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3787 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0539d84 r8:00000002 r7:60000013 r6:e0539d8c r5:85014800 r4:85014800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85014800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7080 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85014800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506538c r4:85065000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506538c r4:850b6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85014800 r8:850b612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6100 r8:80287e08 r7:e0585e60 r6:85096a80 r5:85014800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a7f80 INFO: task kworker/0:238:3787 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3791 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d1d84 r8:00000002 r7:60000113 r6:e05d1d8c r5:85015400 r4:85015400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85015400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85015400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85065b8c r4:85065800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85065b8c r4:850b6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85015400 r8:850b61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6180 r8:80287e08 r7:e0585e60 r6:85096b00 r5:85015400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d1fb0 to 0xe05d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb080 INFO: task kworker/0:239:3791 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:3793 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06b1d84 r8:00000002 r7:60000113 r6:e06b1d8c r5:85016000 r4:85016000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85016000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85016000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85065f8c r4:85065c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85065f8c r4:850b6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85016000 r8:850b622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6200 r8:80287e08 r7:e05d1e60 r6:85096b80 r5:85016000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b1fb0 to 0xe06b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb080 INFO: task kworker/0:240:3793 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3794 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06b5d84 r8:00000002 r7:60000113 r6:e06b5d8c r5:85016c00 r4:85016c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85016c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85016c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0039000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506638c r4:85066000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506638c r4:850b6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85016c00 r8:850b62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6280 r8:80287e08 r7:e06b1e60 r6:85096c00 r5:85016c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b5fb0 to 0xe06b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb280 INFO: task kworker/0:241:3794 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3796 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0601d84 r8:00000002 r7:60000013 r6:e0601d8c r5:84ec5400 r4:84ec5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb500 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec5400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0057000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506678c r4:85066400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506678c r4:850b6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec5400 r8:850b632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6300 r8:80287e08 r7:e06b5e60 r6:850b6380 r5:84ec5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0601fb0 to 0xe0601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb280 INFO: task kworker/0:242:3796 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:3798 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:3798 tgid:3798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000013 r6:e05e1d8c r5:84ec6c00 r4:84ec6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85066b8c r4:85066800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85066b8c r4:850b6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec6c00 r8:850b642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6400 r8:80287e08 r7:e0601e60 r6:850b6480 r5:84ec6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb380 INFO: task kworker/0:243:3798 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:3799 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:3799 tgid:3799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:84ec6000 r4:84ec6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec6000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85066f8c r4:85066c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85066f8c r4:850b6500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec6000 r8:850b652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6500 r8:80287e08 r7:e05e1e60 r6:850b6580 r5:84ec6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb380 INFO: task kworker/0:244:3799 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:3802 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06bdd84 r8:00000002 r7:60000113 r6:e06bdd8c r5:84ec4800 r4:84ec4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbd00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0421000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85067b8c r4:85067800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85067b8c r4:850b6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec4800 r8:850b662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6600 r8:80287e08 r7:e067de60 r6:850b6680 r5:84ec4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06bdfb0 to 0xe06bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb840 INFO: task kworker/0:245:3802 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:3804 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c5d84 r8:00000002 r7:60000013 r6:e06c5d8c r5:84ec2400 r4:84ec2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506738c r4:85067000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506738c r4:850b6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec2400 r8:850b672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6700 r8:80287e08 r7:e06bde60 r6:850b6780 r5:84ec2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb9c0 INFO: task kworker/0:246:3804 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:3806 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:84ec0c00 r4:84ec0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f6000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506778c r4:85067400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506778c r4:850b6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec0c00 r8:850b682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6800 r8:80287e08 r7:e06bde60 r6:850b6880 r5:84ec0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb780 INFO: task kworker/0:247:3806 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:3807 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c1d84 r8:00000002 r7:60000113 r6:e06c1d8c r5:84ec3c00 r4:84ec3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbe00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ec3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85067f8c r4:85067c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85067f8c r4:850b6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec3c00 r8:850b692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6900 r8:80287e08 r7:e06bde60 r6:850b6980 r5:84ec3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c1fb0 to 0xe06c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bb780 INFO: task kworker/0:248:3807 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:3810 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06cdd84 r8:00000002 r7:60000013 r6:e06cdd8c r5:844d6000 r4:844d6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506c78c r4:8506c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506c78c r4:850b6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6000 r8:850b6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6a00 r8:80287e08 r7:e06c1e60 r6:850b6a80 r5:844d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bbc00 INFO: task kworker/0:249:3810 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:3811 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:3811 tgid:3811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06d1d84 r8:00000002 r7:60000013 r6:e06d1d8c r5:85030000 r4:85030000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85030000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85030000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0559000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506c38c r4:8506c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506c38c r4:850b6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85030000 r8:850b6b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6b00 r8:80287e08 r7:e06cde60 r6:850b6b80 r5:85030000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bbc00 INFO: task kworker/0:250:3811 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:3814 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06d9d84 r8:00000002 r7:60000013 r6:e06d9d8c r5:85032400 r4:85032400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85032400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850beb80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85032400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06df000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843b8b8c r4:843b8800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:843b8b8c r4:850b6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85032400 r8:850b6c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6c00 r8:80287e08 r7:e06cde60 r6:850b6c80 r5:85032400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1100 INFO: task kworker/0:251:3814 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:3815 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:3815 tgid:3815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06ddd84 r8:00000002 r7:60000013 r6:e06ddd8c r5:85030c00 r4:85030c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85030c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506cb8c r4:8506c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506cb8c r4:850b6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85030c00 r8:850b6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6d00 r8:80287e08 r7:e06d9e60 r6:850b6d80 r5:85030c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1340 INFO: task kworker/0:252:3815 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:97:3818 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:97 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:85033c00 r4:85033c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85033c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85033c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0777000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506ef8c r4:8506ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8506ef8c r4:85096c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85033c00 r8:85096cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85096c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85096c80 r8:80287e08 r7:e05fde60 r6:850b6e00 r5:85033c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850beac0 INFO: task kworker/1:97:3818 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:3819 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:3819 tgid:3819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f9d84 r8:00000002 r7:60000113 r6:e06f9d8c r5:85034800 r4:85034800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85034800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85034800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ff000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506d38c r4:8506d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506d38c r4:850b6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85034800 r8:850b6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6e80 r8:80287e08 r7:e06d9e60 r6:850b6f00 r5:85034800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1480 INFO: task kworker/0:253:3819 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:3821 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:3821 tgid:3821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:85035400 r4:85035400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85035400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506cf8c r4:8506cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506cf8c r4:850b6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85035400 r8:850b6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b6f80 r8:80287e08 r7:e06f9e60 r6:850c8000 r5:85035400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1700 INFO: task kworker/0:254:3821 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:3823 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06d5d84 r8:00000002 r7:60000013 r6:e06d5d8c r5:85031800 r4:85031800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85031800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85031800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506d78c r4:8506d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506d78c r4:850c8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85031800 r8:850c80ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8080 r8:80287e08 r7:e06f9e60 r6:850c8100 r5:85031800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d5fb0 to 0xe06d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d18c0 INFO: task kworker/0:255:3823 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:3825 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:85036000 r4:85036000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85036000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85036000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506df8c r4:8506dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506df8c r4:850c8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036000 r8:850c81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8180 r8:80287e08 r7:e06d5e60 r6:850c8200 r5:85036000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1980 INFO: task kworker/0:256:3825 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:3827 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:3827 tgid:3827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0729d84 r8:00000002 r7:60000113 r6:e0729d8c r5:85033000 r4:85033000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85033000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85033000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506db8c r4:8506d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506db8c r4:850c8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85033000 r8:850c82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8280 r8:80287e08 r7:e070de60 r6:850c8300 r5:85033000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1a80 INFO: task kworker/0:257:3827 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:3829 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:85013000 r4:85013000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85013000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d1280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85013000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506e38c r4:8506e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506e38c r4:850c8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85013000 r8:850c83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8380 r8:80287e08 r7:e070de60 r6:85096d00 r5:85013000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1dc0 INFO: task kworker/0:258:3829 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:3831 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0749d84 r8:00000002 r7:60000113 r6:e0749d8c r5:85018c00 r4:85018c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbd40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506e78c r4:8506e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506e78c r4:850c8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:850c842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8400 r8:80287e08 r7:e0739e60 r6:85096d80 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0749fb0 to 0xe0749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d1e40 INFO: task kworker/0:259:3831 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e5c99000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:3833 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:3833 tgid:3833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0759d84 r8:00000002 r7:60000013 r6:e0759d8c r5:8501a400 r4:8501a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506eb8c r4:8506e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506eb8c r4:850c8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501a400 r8:850c84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8480 r8:80287e08 r7:e0749e60 r6:85096e00 r5:8501a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0759fb0 to 0xe0759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bbfc0 INFO: task kworker/0:260:3833 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e7629000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:3834 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:3834 tgid:3834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0765d84 r8:00000002 r7:60000113 r6:e0765d8c r5:8501b000 r4:8501b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f35c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501b000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507738c r4:85077000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507738c r4:850c8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501b000 r8:850c852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8500 r8:80287e08 r7:e0759e60 r6:85096e80 r5:8501b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0765fb0 to 0xe0765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bbfc0 INFO: task kworker/0:261:3834 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e7629000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:3836 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:3836 tgid:3836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0775d84 r8:00000002 r7:60000113 r6:e0775d8c r5:8501bc00 r4:8501bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0793000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506f38c r4:8506f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506f38c r4:850c8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501bc00 r8:850c85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8580 r8:80287e08 r7:e0765e60 r6:85096f00 r5:8501bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0775fb0 to 0xe0775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4080 INFO: task kworker/0:262:3836 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e7be8000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3839 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b5d84 r8:00000002 r7:60000113 r6:e07b5d8c r5:85019800 r4:85019800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85019800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e23c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85019800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507838c r4:85078000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8507838c r4:85096f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85019800 r8:85096fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85096f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85096f80 r8:80287e08 r7:e05fde60 r6:850df000 r5:85019800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b5fb0 to 0xe07b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850be440 INFO: task kworker/1:98:3839 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e7d7a000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:3840 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:3840 tgid:3840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b9d84 r8:00000002 r7:60000013 r6:e07b9d8c r5:8501c800 r4:8501c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ab000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506f78c r4:8506f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506f78c r4:850c8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501c800 r8:850c862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8600 r8:80287e08 r7:e0765e60 r6:850df080 r5:8501c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b9fb0 to 0xe07b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4300 INFO: task kworker/0:263:3840 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e7d7a000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:3842 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:85018000 r4:85018000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d46c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85018000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506fb8c r4:8506f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506fb8c r4:850c8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018000 r8:850c86ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8680 r8:80287e08 r7:e0765e60 r6:850df100 r5:85018000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c9fb0 to 0xe07c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d44c0 INFO: task kworker/0:264:3842 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e8506000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:3844 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07cdd84 r8:00000002 r7:60000113 r6:e07cdd8c r5:8501e000 r4:8501e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d48c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501e000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df987000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506ff8c r4:8506fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506ff8c r4:850c8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501e000 r8:850c872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8700 r8:80287e08 r7:e0765e60 r6:850df180 r5:8501e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07cdfb0 to 0xe07cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4500 INFO: task kworker/0:265:3844 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e8549000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:3846 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:8501d400 r4:8501d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507438c r4:85074000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507438c r4:850c8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:850c87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8780 r8:80287e08 r7:e0765e60 r6:850df200 r5:8501d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4900 INFO: task kworker/0:266:3846 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e88b6000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:3848 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e064dd84 r8:00000002 r7:60000113 r6:e064dd8c r5:8501ec00 r4:8501ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507478c r4:85074400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507478c r4:850c8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501ec00 r8:850c882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8800 r8:80287e08 r7:e0765e60 r6:850df280 r5:8501ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4ac0 INFO: task kworker/0:267:3848 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e8c6f000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:3850 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:3850 tgid:3850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07d1d84 r8:00000002 r7:60000013 r6:e07d1d8c r5:85038c00 r4:85038c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85038c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85038c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85074b8c r4:85074800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85074b8c r4:850c8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85038c00 r8:850c88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8880 r8:80287e08 r7:e0765e60 r6:850df300 r5:85038c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4a40 INFO: task kworker/0:268:3850 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e9386000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:3852 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07d9d84 r8:00000002 r7:60000113 r6:e07d9d8c r5:85038000 r4:85038000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85038000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85038000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85074f8c r4:85074c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85074f8c r4:850c8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85038000 r8:850c892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8900 r8:80287e08 r7:e0765e60 r6:850df380 r5:85038000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d9fb0 to 0xe07d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4a00 INFO: task kworker/0:269:3852 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e9386000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:3854 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:3854 tgid:3854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07e1d84 r8:00000002 r7:60000113 r6:e07e1d8c r5:85039800 r4:85039800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85039800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85039800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507538c r4:85075000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507538c r4:850c8980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85039800 r8:850c89ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8980 r8:80287e08 r7:e0765e60 r6:850df400 r5:85039800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e1fb0 to 0xe07e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4e00 INFO: task kworker/0:270:3854 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e943e000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:3856 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:3856 tgid:3856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07e9d84 r8:00000002 r7:60000113 r6:e07e9d8c r5:8503bc00 r4:8503bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d44c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8503bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc79000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507578c r4:85075400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507578c r4:850c8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503bc00 r8:850c8a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8a00 r8:80287e08 r7:e0765e60 r6:850df480 r5:8503bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e9fb0 to 0xe07e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4d40 INFO: task kworker/0:271:3856 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e99b7000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:3858 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f1d84 r8:00000002 r7:60000113 r6:e07f1d8c r5:8503b000 r4:8503b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d4200 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8503b000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85075b8c r4:85075800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85075b8c r4:850c8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503b000 r8:850c8aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8a80 r8:80287e08 r7:e0765e60 r6:850df500 r5:8503b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f1fb0 to 0xe07f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d4080 INFO: task kworker/0:272:3858 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: e9d17000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:3860 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f9d84 r8:00000002 r7:60000113 r6:e07f9d8c r5:8503d400 r4:8503d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bec40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8503d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcfd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85075f8c r4:85075c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85075f8c r4:850c8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503d400 r8:850c8b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8b00 r8:80287e08 r7:e0765e60 r6:850df580 r5:8503d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f9fb0 to 0xe07f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d41c0 INFO: task kworker/0:273:3860 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: ea0d2000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e4829d84 r8:00000002 r7:60000013 r6:e4829d8c r5:8503e000 r5:8503e000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4829e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:850be440 Call trace: dd60: 80230ad0 80239bb0 80070013 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:3864 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:3864 tgid:3864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4835d84 r8:00000002 r7:60000113 r6:e4835d8c r5:8503a400 r4:8503a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4835e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f30c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8503a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507678c r4:85076400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507678c r4:850c8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe4835fb0 to 0xe4835ff8) task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e007ddc0 r5:00001000 r4:e002d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:276 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8503c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e483de08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:850f3180 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e002d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8503ec00 r5:8503ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4845e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8503ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85076f8c r4:85076c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85076f8c r4:850c8d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503ec00 r8:850c8d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8d00 r8:80287e08 r7:e0765e60 r6:850df780 r5:8503ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4845fb0 to 0xe4845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f3140 INFO: task kworker/0:277:3868 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: eaebe000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84fc4040 task:kworker/0:278 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85110c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85110c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r10:61c88647 r9:85110c00 r8:850c8dac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 Exception stack(0xe007dfb0 to 0xe007dff8) INFO: task kworker/0:279:3872 blocked for more than 453 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:3872 tgid:3872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4855d84 r8:00000002 r7:60000013 r6:e4855d8c r5:85112400 r4:85112400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85112400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4855e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f36c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507778c r4:85077400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507778c r4:850c8e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85112400 r8:850c8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8e00 r8:80287e08 r7:e484de60 r6:850df880 r5:85112400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4855fb0 to 0xe4855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f3440 INFO: task kworker/0:279:3872 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: eb134000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:e002d000 r5:84dd738c r4:84dd7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:e485dd84 r8:00000002 r7:60000013 r6:e485dd8c r5:85111800 r4:85111800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85077b8c r4:85077800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85077b8c r4:850c8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85111800 r8:850c8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8e80 r8:80287e08 r7:e484de60 r6:850df900 r5:85111800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe485dfb0 to 0xe485dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f3580 INFO: task kworker/0:280:3874 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: eb39a000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84fc4040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85110000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r9:83018005 r8:85110000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:85077f8c r4:85077c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c8f00 r8:80287e08 r7:e484de60 r6:850df980 r5:85110000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4865fb0 to 0xe4865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f3840 INFO: task kworker/0:281:3876 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: eb5b3000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:e002d000 Exception stack(0xe007dfb0 to 0xe007dff8) r4:85113c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r10:00000000 r9:850dfa80 r8:80287e08 r7:e05fde60 r6:850dfb00 r5:85113c00 r5:80070013 r4:80239bb0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85114800 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85114800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843b838c r4:843b8000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843b838c r4:850dfb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85114800 r8:850dfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850dfb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dfb80 r8:80287e08 r7:e07bde60 r6:850dfc00 r5:85114800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4869fb0 to 0xe4869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851041c0 INFO: task kworker/1:100:3882 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: eb8c2000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:e002d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e486dd84 r8:00000002 r7:60000013 r6:e486dd8c r5:85115400 r4:85115400 r5:85115400 r4:8291a680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe007dd28 to 0xe007dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r5:00001000 r4:e002d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84fc4040 task:kworker/1:102 state:D stack:0 pid:3886 tgid:3886 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85116000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4861e08 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85116000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514838c r4:85148000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514838c r4:850dfd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85116000 r8:850dfdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850dfd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dfd80 r8:80287e08 r7:e486de60 r6:850dfe00 r5:85116000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4861fb0 to 0xe4861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85104300 INFO: task kworker/1:102:3886 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: ebc22000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe007dfb0 to 0xe007dff8) INFO: task kworker/0:282:3887 blocked for more than 454 seconds. r4:85116c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4875e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85040000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85040000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:3892 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:3892 tgid:3892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e487dd84 r8:00000002 r7:60000113 r6:e487dd8c r5:85041800 r4:85041800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85041800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e487de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0485000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85078f8c r4:85078c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85078f8c r4:850f4080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85041800 r8:850f40ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4080 r8:80287e08 r7:e484de60 r6:850dff80 r5:85041800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe487dfb0 to 0xe487dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: ec0a6000 edded000 00000001 80239b98 7f2f1000 00000001 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 Exception stack(0xe007dfb0 to 0xe007dff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85040c00 r5:85040c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8891e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4040 INFO: task kworker/0:286:3896 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8899d84 r8:00000002 r7:60000113 r6:e8899d8c r5:85042400 r4:85042400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85042400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8899e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85042400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507978c r4:85079400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507978c r4:850f4200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85042400 r8:850f422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4200 r8:80287e08 r7:e8891e60 r6:85103000 r5:85042400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8899fb0 to 0xe8899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa000 INFO: task kworker/0:286:3896 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80070013 ffffffff [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fc4040 Call trace: r5:85044800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa340 Exception stack(0xe88a1fb0 to 0xe88a1ff8) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:288 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85043c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85043c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85079f8c r4:85079c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85079f8c r4:850f4280 r10:61c88647 r9:85043c00 r8:850f42ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80070013 ffffffff r4:e007ddc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:84fc4040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85043000 r5:85043000 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe88adfb0 to 0xe88adff8) task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3000 r8:84fbb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:3904 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b9d84 r8:00000002 r7:60000113 r6:e88b9d8c r5:85045400 r4:85045400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85045400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa6c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507a78c r4:8507a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507a78c r4:850f4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85045400 r8:850f432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4300 r8:80287e08 r7:e8891e60 r6:85103280 r5:85045400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b9fb0 to 0xe88b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa240 INFO: task kworker/0:289:3904 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: ec9ec000 edded000 00000001 80239b98 7f2f1000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e002d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85046000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: ecc3a000 edded000 00000001 80239b98 7f2f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 Exception stack(0xe007dfb0 to 0xe007dff8) Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06b9d84 r8:00000002 r7:60000113 r6:e06b9d8c r5:85046c00 r4:85046c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85046c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507ab8c r4:8507a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507ab8c r4:850f4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046c00 r8:850f442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4400 r8:80287e08 r7:e88c1e60 r6:85103380 r5:85046c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:85005400 r5:85005400 r4:8291a680 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8507b38c r4:8507b000 r10:00000000 r9:850f4480 r8:80287e08 r7:e88c1e60 r6:85103400 r5:85005400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0705fb0 to 0xe0705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa780 INFO: task kworker/0:292:3910 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe007dd28 to 0xe007dd70) dd20: ed1b4000 edded000 00000001 80239b98 7f2f1000 00000001 dd40: 82ac15a0 7f2f1000 edded000 8280c928 82ac21c4 e007dda4 e007dda8 e007dd78 dd60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e007ddc0 r5:e007de08 r4:e007ddc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dd738c r4:84dd7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85118c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08 r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe81000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507bb8c r4:8507b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507bb8c r4:850f4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85118c00 r8:850f452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4500 r8:80287e08 r7:e0705e60 r6:85103480 r5:85118c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0731fb0 to 0xe0731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa680 INFO: task kworker/0:293:3912 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:84fbb180 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0751d84 r8:00000002 r7:60000013 r6:e0751d8c r5:8511a400 r4:8511a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fabc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8511a400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507b78c r4:8507b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507b78c r4:850f4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511a400 r8:850f45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4580 r8:80287e08 r7:e0731e60 r6:85103500 r5:8511a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa940 INFO: task kworker/0:294:3914 is blocked on a mutex likely owned by task kworker/1:92:3654. task:kworker/1:92 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d3000 r8:80200be4 r7:e007dd5c r6:ffffffff r5:844d3000 r5:80070013 r4:80239bb0 r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r4:00000001 INFO: task kworker/0:295:3916 blocked for more than 454 seconds. r4:8511b000 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:8511b000 r8:850f462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa940 Call trace: dd60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:84dd738c r4:84fbb180 r4:84fbb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb180 r8:80287e08 r7:e0079e60 r6:84fbc900 r5:844d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4040 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:104:3918 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:104 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:8511bc00 r4:8511bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85188980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:85148f8c r4:85103600 Exception stack(0xe0755fb0 to 0xe0755ff8) Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e002d000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0771d84 r8:00000002 r7:60000113 r6:e0771d8c r5:8511c800 r4:8511c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fafc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8511c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0015000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507c38c r4:8507c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8511c800 r8:850f46ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc4340 r4:8511d400 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8507c78c r4:8507c400 r10:61c88647 r9:8511d400 r8:850f472c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 7f66e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:3925 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e079dd84 r8:00000002 r7:60000013 r6:e079dd8c r5:8511e000 r4:8511e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510e040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8511e000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f4000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507cf8c r4:8507cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507cf8c r4:850f4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511e000 r8:850f47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4780 r8:80287e08 r7:e077de60 r6:85103800 r5:8511e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 7f9da000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:105:3927 blocked for more than 454 seconds. Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8514938c r4:85149000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 7fd2a000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:3928 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07a9d84 r8:00000002 r7:60000013 r6:e07a9d8c r5:85118000 r4:85118000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85118000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85118000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8507cb8c r4:8507c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850f4800 r8:80287e08 r7:e079de60 r6:85103980 r5:85118000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:3931 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b1d84 r8:00000002 r7:60000013 r6:e07b1d8c r5:85119800 r4:85119800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85119800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510e440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8507d38c r4:8507d000 r4:850f4880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 INFO: task kworker/1:106:3933 blocked for more than 454 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4879e08 r5:8514978c r4:85149400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85103a80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: 8065d000 e004b000 00000001 80239b98 7f14b000 00000001 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018005 r8:84c40c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r7:dddced80 r6:83018000 r5:8507d78c r4:850f4900 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c5fb0 to 0xe88c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510e200 INFO: task kworker/0:301:3935 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 806fb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85149b8c r4:85149800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85103b80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:302:3939 blocked for more than 454 seconds. r4:84c42400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d5e08 r5:00001000 r4:e0695000 r5:8507e78c r4:8507e400 r7:dddced80 r6:83018000 r5:8507e78c r4:850f4a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c42400 r8:850f4aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4a80 r8:80287e08 r7:e88c5e60 r6:850f4b00 r5:84c42400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d5fb0 to 0xe88d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510e4c0 INFO: task kworker/0:302:3939 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 81098000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:108:3940 blocked for more than 454 seconds. r4:84c43c00 r4:00000000 r4:00000000 r5:85149f8c r4:85149c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85149f8c r4:85103c00 r10:61c88647 r9:84c43c00 r8:85103c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85188dc0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:109:3942 blocked for more than 454 seconds. [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:8514a78c r4:8514a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514a78c r4:85103c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c41800 r8:85103cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85103c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85103c80 r8:80287e08 r7:e88ade60 r6:850f4c00 r5:84c41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88ddfb0 to 0xe88ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85188f00 INFO: task kworker/1:109:3942 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 815d7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:3945 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:3945 tgid:3945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07c5d84 r8:00000002 r7:60000113 r6:e07c5d8c r5:85120000 r4:85120000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85120000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510ecc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0651000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507db8c r4:8507d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507db8c r4:850f4c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85120000 r8:850f4cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4c80 r8:80287e08 r7:e88d5e60 r6:85103d00 r5:85120000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c5fb0 to 0xe07c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510eb40 INFO: task kworker/0:303:3945 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 815d7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c9e08 r9:83018005 r8:85120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 r5:8507df8c r4:8507dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85120c00 r8:850f4d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8510ea00 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:305:3948 blocked for more than 454 seconds. r4:85121800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0675000 r5:8507e38c r4:8507e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85121800 r8:850f4dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8510ec40 INFO: task kworker/0:305:3948 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 81dc5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:3951 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88f1d84 r8:00000002 r7:60000013 r6:e88f1d8c r5:85123c00 r4:85123c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85123c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df98b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508078c r4:85080400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508078c r4:850f4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85124800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8507eb8c r4:8507e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85124800 r8:850f4eac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8510ee80 INFO: task kworker/0:307:3953 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 82a15000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:3954 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:85123000 r4:85123000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85123000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8507ef8c r4:8507ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85123000 r8:850f4f2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea915d84 r8:00000002 r7:60000113 r6:ea915d8c r5:85122400 r4:85122400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85122400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85122400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0723000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507f38c r4:8507f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507f38c r4:850f4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85122400 r8:850f4fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f4f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f4f80 r8:80287e08 r7:e88f1e60 r6:8518d000 r5:85122400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510a1c0 INFO: task kworker/0:309:3957 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 83009000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:310:3959 blocked for more than 455 seconds. [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8507f78c r4:8507f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85187000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:311:3960 blocked for more than 455 seconds. r10:8291a684 r9:ea921d84 r8:00000002 r7:60000013 r6:ea921d8c r5:85126000 r4:85126000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85126000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0779000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507fb8c r4:8507f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507fb8c r4:85187080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85126000 r8:851870ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187080 r8:80287e08 r7:e88f1e60 r6:8518d100 r5:85126000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea921fb0 to 0xea921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510a200 INFO: task kworker/0:311:3960 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 83493000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:3962 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea929d84 r8:00000002 r7:60000113 r6:ea929d8c r5:85128c00 r4:85128c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85128c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea929e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85128c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507ff8c r4:8507fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507ff8c r4:85187100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85128c00 r8:8518712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187100 r8:80287e08 r7:e88f1e60 r6:8518d180 r5:85128c00 Exception stack(0xea929fb0 to 0xea929ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 83493000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ea931d84 r8:00000002 r7:60000113 r6:ea931d8c r5:8512a400 r4:00000000 r4:00000000 r5:8508038c r4:85080000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508038c r4:85187180 r10:61c88647 r9:8512a400 r8:851871ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:3966 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:85129800 r4:85129800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85129800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510ac80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85129800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508138c r4:85081000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508138c r4:85187200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85129800 r8:8518722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187200 r8:80287e08 r7:e88f1e60 r6:8518d280 r5:85129800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510a580 INFO: task kworker/0:314:3966 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8388e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:3968 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea939d84 r8:00000002 r7:60000013 r6:ea939d8c r5:85128000 r4:85128000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85128000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510ab40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85128000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85080f8c r4:85080c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85080f8c r4:85187280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85128000 r8:851872ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187280 r8:80287e08 r7:dfcc5e60 r6:8518d300 r5:85128000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea939fb0 to 0xea939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510a740 INFO: task kworker/0:315:3968 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8388e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 task:kworker/1:110 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4841e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514af8c r4:8514ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8518d380 Exception stack(0xe4841fb0 to 0xe4841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85185440 INFO: task kworker/1:110:3973 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 84854000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514b38c r4:8514b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514b38c r4:8518d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512c800 r8:8518d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8518d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518d480 r8:80287e08 r7:e4841e60 r6:8518d500 r5:8512c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea941fb0 to 0xea941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85185440 INFO: task kworker/1:111:3974 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 84854000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8512d400 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514b78c r4:8514b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514b78c r4:8518d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512d400 r8:8518d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8518d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518d580 r8:80287e08 r7:ea941e60 r6:8518d600 r5:8512d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e1fb0 to 0xe88e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85185440 INFO: task kworker/1:112:3976 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 84854000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:113:3977 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3977 tgid:3977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:8512e000 r4:8512e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8512e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfced000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85080b8c r4:85080800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85080b8c r4:8518d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512e000 r8:8518d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8518d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518d680 r8:80287e08 r7:e88e1e60 r6:8518d700 r5:8512e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:114:3979 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:114 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:8512ec00 r4:8512ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a9f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8512ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514bf8c r4:8514bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8518d780 Exception stack(0xea945fb0 to 0xea945ff8) task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3981 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea94dd84 r8:00000002 r7:60000113 r6:ea94dd8c r5:8512b000 r4:8512b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508538c r4:85085000 r7:ddde2d80 r6:83018200 r5:8508538c r4:8518d880 r10:00000000 r9:8518d880 r8:80287e08 r7:ea945e60 r6:8518d900 r5:8512b000 r4:84765300 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:3984 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:3984 tgid:3984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:85126c00 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dff0d000 r5:8508178c r4:85081400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85187380 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea955fb0 to 0xea955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510af40 INFO: task kworker/0:316:3984 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 856c0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 task:kworker/0:317 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85081b8c r4:85081800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85081b8c r4:85187400 r10:61c88647 r9:84c10c00 r8:8518742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189000 INFO: task kworker/0:317:3986 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 856c0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:3988 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea951d84 r8:00000002 r7:60000113 r6:ea951d8c r5:84c46c00 r4:84c46c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c46c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851892c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c46c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85081f8c r4:85081c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85081f8c r4:85187480 r10:61c88647 r9:84c46c00 r8:851874ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 858a9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 r5:00001000 r4:dffef000 r5:85082b8c r4:85082800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c46000 r8:851875ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187580 r8:80287e08 r7:ea951e60 r6:85187600 r5:84c46000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189140 INFO: task kworker/0:319:3990 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 858a9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:3992 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:ea95dd84 r8:00000002 r7:60000113 r6:ea95dd8c r5:84c44800 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:84c44800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:8508238c r4:85082000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508238c r4:85187680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c44800 r8:851876ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187680 r8:80287e08 r7:ea965e60 r6:85187700 r5:84c44800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189300 INFO: task kworker/0:320:3992 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8614c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:321 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea979e08 r9:83018005 r8:84c13000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508278c r4:85082400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508278c r4:85187780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c13000 r8:851877ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187780 r8:80287e08 r7:ea965e60 r6:8518da80 r5:84c13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea979fb0 to 0xea979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851896c0 INFO: task kworker/0:321:3995 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:322:3996 blocked for more than 455 seconds. r10:8291a684 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:84c10000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e04f1000 r5:8508438c r4:85084000 r7:dddced80 r6:83018000 r5:8508438c r4:85187800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c10000 r8:8518782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187800 r8:80287e08 r7:ea965e60 r6:8518db00 r5:84c10000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189600 INFO: task kworker/0:322:3996 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 86815000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 INFO: task kworker/0:323:3998 blocked for more than 455 seconds. r10:8291a684 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:84c13c00 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85082f8c r4:85082c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85187880 r8:80287e08 r7:ea97de60 r6:8518db80 r5:84c13c00 r4:85189600 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:3999 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:84c14800 r4:84c14800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c14800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c14800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508338c r4:85083000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508338c r4:85187900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c14800 r8:8518792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187900 r8:80287e08 r7:ea97de60 r6:8518dc00 r5:84c14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851897c0 INFO: task kworker/0:324:3999 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 86ad2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:eceef000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8508378c r4:85187980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c11800 r8:851879ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187980 r8:80287e08 r7:ea97de60 r6:8518dc80 r5:84c11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189840 INFO: task kworker/0:325:4002 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 86ad2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4003 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4003 tgid:4003 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:84c12400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189d00 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85083b8c r4:85083800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083b8c r4:85187a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c12400 r8:85187a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187a00 r8:80287e08 r7:ea97de60 r6:8518dd00 r5:84c12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189a00 INFO: task kworker/0:326:4003 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 870e9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:e04bb000 r5:85083f8c r4:85083c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85187a80 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189b00 INFO: task kworker/0:327:4005 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 879bb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4007 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:00001000 r4:e0603000 r5:8508478c r4:85084400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c16000 r8:85187b2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 879bb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4009 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4009 tgid:4009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:85130c00 r4:85130c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85130c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85130c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0735000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508578c r4:85085400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85130c00 r8:85187bac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4011 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4011 tgid:4011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:85130000 r4:85130000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85130000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85130000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:85084b8c r4:85084800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85084b8c r4:85187c00 r10:61c88647 r9:85130000 r8:85187c2c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:4013 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9cdd84 r8:00000002 r7:60000113 r6:ea9cdd8c r5:85133000 r4:85133000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85133000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a22c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85133000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85084f8c r4:85084c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85133000 r8:85187cac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:4016 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea969d84 r8:00000002 r7:60000113 r6:ea969d8c r5:85131800 r4:85131800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85131800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a9b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85131800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:843ba38c r4:843ba000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843ba38c r4:851aa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85131800 r8:851aa02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851aa000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aa000 r8:80287e08 r7:ea945e60 r6:851aa080 r5:85131800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8518e280 INFO: task kworker/1:116:4016 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8924c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85133c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85085f8c r4:85085c00 r7:dddced80 r6:83018000 r5:85085f8c r4:85187d00 r10:61c88647 r9:85133c00 r8:85187d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187d00 r8:80287e08 r7:ea9b1e60 r6:851aa100 r5:85133c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a25c0 INFO: task kworker/0:332:4017 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 898dc000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:4019 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:4019 tgid:4019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a1d84 r8:00000002 r7:60000113 r6:e06a1d8c r5:85134800 r4:85134800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85134800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85134800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07dd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85085b8c r4:85085800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85085b8c r4:85187d80 r10:61c88647 r9:85134800 r8:85187dac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a26c0 INFO: task kworker/0:333:4019 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8a1b8000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:334 state:D stack:0 pid:4023 tgid:4023 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508638c r4:85086000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85135400 r8:85187e2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d20: 8a806000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4024 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8885d84 r8:00000002 r7:60000113 r6:e8885d8c r5:85136000 r4:85136000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85136000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8885e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85136000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb75000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508678c r4:85086400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508678c r4:85187e80 r4:85187e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187e80 r8:80287e08 r7:ea9c5e60 r6:851aa280 r5:85136000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8885fb0 to 0xe8885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a2440 INFO: task kworker/0:335:4024 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8a806000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84c16c00 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84765400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0087000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85087b8c r4:85087800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85087b8c r4:85187f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c16c00 r8:85187f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187f00 r8:80287e08 r7:e8885e60 r6:851aa300 r5:84c16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a29c0 INFO: task kworker/0:336:4027 is blocked on a mutex likely owned by task kworker/1:93:3664. r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:337:4028 blocked for more than 455 seconds. Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85136c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe27000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85086b8c r4:85086800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85086b8c r4:85187f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85136c00 r8:85187fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85187f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187f80 r8:80287e08 r7:ea9d9e60 r6:851aa380 r5:85136c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a2bc0 INFO: task kworker/0:337:4028 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8adf4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:85086f8c r4:85086c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85187300 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a2b00 INFO: task kworker/0:338:4030 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8adf4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84fc4380 task:kworker/0:339 state:D stack:0 pid:4032 tgid:4032 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2f40 r5:8508738c r4:85087000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851c8000 r8:851a402c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: 8adf4000 e004b000 00000001 80239b98 7f14b000 00000001 r4:82ac21e4 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4034 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa01d84 r8:00000002 r7:60000013 r6:eaa01d8c r5:851c9800 r4:851c9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2240 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0059000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508778c r4:85087400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508778c r4:851a4080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c9800 r8:851a40ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: 8b4cd000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:851cb000 r4:8291a680 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851cb000 r8:851a412c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:851cd400 r4:851cd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e2300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f2000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85087f8c r4:85087c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85087f8c r4:851a4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cd400 r8:851a41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a4180 r8:80287e08 r7:eaa05e60 r6:851aa600 r5:851cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189f80 INFO: task kworker/0:342:4040 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8b4cd000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4041 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851ce000 r8:851a422c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4044 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa29d84 r8:00000002 r7:60000013 r6:eaa29d8c r5:851cc800 r4:851cc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85088f8c r4:85088c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85088f8c r4:851a4280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:851a4280 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84c45400 r4:8291a680 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c45400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0581000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85088b8c r4:85088800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85088b8c r4:851a4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c45400 r8:851a432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a4300 r8:80287e08 r7:eaa29e60 r6:851a4380 r5:84c45400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea96dfb0 to 0xea96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851af1c0 INFO: task kworker/0:345:4045 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8ba64000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 INFO: task kworker/0:346:4047 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:85036c00 r4:85036c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85036c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8508938c r4:85089000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85036c00 r8:851a442c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84c20000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:8508978c r4:85089400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c20000 r8:851a452c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xea90dfb0 to 0xea90dff8) r4:851af3c0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4051 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa31d84 r8:00000002 r7:60000013 r6:eaa31d8c r5:84c21800 r4:84c21800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c21800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c21800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85089b8c r4:85089800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85089b8c r4:851a4600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c21800 r8:851a462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a4600 r8:80287e08 r7:ea90de60 r6:851a4680 r5:84c21800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:349:4053 blocked for more than 455 seconds. Call trace: r5:84c20c00 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e06a5000 r5:85089f8c r4:85089c00 r7:dddced80 r6:83018000 r5:85089f8c r4:851a4700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8508a38c r4:851a4800 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8c323000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4056 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:84c24800 r4:84c24800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c24800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c24800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8895000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508af8c r4:8508ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508af8c r4:851a4900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c24800 r8:851a492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a4900 r8:80287e08 r7:eaa2de60 r6:851a4980 r5:84c24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851af9c0 INFO: task kworker/0:351:4056 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8c591000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:117:4059 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a9b80 r5:843b9f8c r4:843b9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:843b9f8c r4:851aa780 r4:851aa780 Exception stack(0xeaa49fb0 to 0xeaa49ff8) task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:118:4061 blocked for more than 456 seconds. r4:84c23000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84c23000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 r5:843b9b8c r4:843b9800 r10:61c88647 r9:84c23000 r8:851aa82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:119:4062 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:119 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:84c26c00 r4:84c26c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c26c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517178c r4:85171400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517178c r4:851aa880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c26c00 r8:851aa8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851aa880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aa880 r8:80287e08 r7:eaa51e60 r6:851a4b00 r5:84c26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a9ac0 INFO: task kworker/1:119:4062 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8d3aa000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:120:4065 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:120 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:84c22400 r4:84c22400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c22400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8508a78c r4:8508a400 r10:61c88647 r9:84c22400 r8:851aa92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4066 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4066 tgid:4066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:84c40000 r4:84c40000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c40000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4d00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c40000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8881000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508ab8c r4:8508a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508ab8c r4:851a4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c40000 r8:851a4c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a4c00 r8:80287e08 r7:eaa3de60 r6:851a4c80 r5:84c40000 r4:851b4380 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:851d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r5:8517038c r4:85170000 r10:61c88647 r9:851d8c00 r8:851aa9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851a9ac0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84368400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851da400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4837000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517078c r4:85170400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517078c r4:851aaa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851da400 r8:851aaa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851aaa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851aaa00 r8:80287e08 r7:eaa59e60 r6:851a4d80 r5:851da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851a95c0 INFO: task kworker/1:122:4070 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 8e3d6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851db000 r8:851aaaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851afe40 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8436df40 r5:8508b38c r4:8508b000 r7:ddde2d80 r6:83018200 r5:8508b38c r4:851aab00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: 8edfa000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:4077 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa7dd84 r8:00000002 r7:60000013 r6:eaa7dd8c r5:851d9800 r4:851d9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508bb8c r4:8508b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508bb8c r4:851a4f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d9800 r8:851a4f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a4f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a4f00 r8:80287e08 r7:eaa3de60 r6:851a4f80 r5:851d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b4c40 INFO: task kworker/0:353:4077 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:354:4078 blocked for more than 456 seconds. r4:851dc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8508b78c r4:851a6080 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:125:4082 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:125 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa41d84 r8:00000002 r7:60000113 r6:eaa41d8c r5:851dd400 r4:851dd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851dd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:851dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:8517138c r4:85171000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851aab80 r8:80287e08 r7:eaa59e60 r6:851a6180 r5:851dd400 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8520078c r4:85200400 r4:851a6200 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:851dec00 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b4540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88fb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508bf8c r4:8508bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508bf8c r4:851a6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851dec00 r8:851a632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6300 r8:80287e08 r7:eaa85e60 r6:851a6380 r5:851dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b4500 INFO: task kworker/0:356:4084 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 904f2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:357:4087 blocked for more than 456 seconds. r4:851dbc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851dbc00 r8:851a642c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:4094 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:4094 tgid:4094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaa5d84 r8:00000002 r7:60000113 r6:eaaa5d8c r5:851e9800 r4:851e9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ab440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85200b8c r4:85200800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85200b8c r4:851a6500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e9800 r8:851a652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a6500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6500 r8:80287e08 r7:eaa85e60 r6:851a6580 r5:851e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaa9d84 r8:00000002 r7:60000013 r6:eaaa9d8c r5:851ea400 r4:851ea400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ea400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ab540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85200f8c r4:85200c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85200f8c r4:851a6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ea400 r8:851a662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6600 r8:80287e08 r7:eaaa5e60 r6:851a6680 r5:851ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ab5c0 INFO: task kworker/0:359:4095 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 90e65000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4096 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4096 tgid:4096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eaaadd84 r8:00000002 r7:60000013 r6:eaaadd8c r5:851eb000 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520178c r4:85201400 r7:dddced80 r6:83018000 r5:8520178c r4:851a6700 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: 911fa000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 r4:84fc4380 task:kworker/1:126 state:D stack:0 pid:4097 tgid:4097 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85171f8c r4:85171c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851aac00 r8:80287e08 r7:eaa59e60 r6:851aac80 r5:851ca400 Workqueue: events bpf_prog_free_deferred 9d20: 915e5000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:361:4099 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea971d84 r8:00000002 r7:60000113 r6:ea971d8c r5:851cbc00 r4:851cbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea971e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851afe40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520138c r4:85201000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520138c r4:851a6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cbc00 r8:851a682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6800 r8:80287e08 r7:eaaade60 r6:851aad80 r5:851cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea971fb0 to 0xea971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ab5c0 INFO: task kworker/0:361:4099 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 915e5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851cec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85171b8c r4:851aad00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: 91a1f000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:128:4102 blocked for more than 456 seconds. [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1dc0 r5:8517238c r4:85172000 r10:61c88647 r9:83b30c00 r8:851aaeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:129:4104 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:129 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaab9d84 r8:00000002 r7:60000013 r6:eaab9d8c r5:85132400 r4:85132400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85132400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85132400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff51000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517278c r4:85172400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517278c r4:851aaf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85132400 r8:851aafac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851aaf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 92588000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:130 state:D stack:0 pid:4106 tgid:4106 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:851e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:85172b8c r4:85172800 r10:61c88647 r9:851e0000 r8:84361bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:131:4108 blocked for more than 457 seconds. r10:8291a684 r9:eaac1d84 r8:00000002 r7:60000013 r6:eaac1d8c r5:851e0c00 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0009000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517338c r4:85173000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517338c r4:851b3080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e0c00 r8:851b30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3080 r8:80287e08 r7:eaabde60 r6:851b3100 r5:851e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851b1f80 INFO: task kworker/1:131:4108 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9310b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:132:4110 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:851e1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r5:00001000 r4:dffb9000 r5:85172f8c r4:85172c00 r10:61c88647 r9:851e1800 r8:851b31ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 r4:851e2400 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517378c r4:85173400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517378c r4:851b3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e2400 r8:851b32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3280 r8:80287e08 r7:eaac1e60 r6:851b3300 r5:851e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ad040 INFO: task kworker/1:133:4112 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 93537000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:4113 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85173b8c r4:851b3380 r10:61c88647 r9:851e3000 r8:851b33ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3380 r8:80287e08 r7:eaac9e60 r6:851b3400 r5:851e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ad040 INFO: task kworker/1:134:4113 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85178f8c r4:85178c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eaad5d84 r8:00000002 r7:60000013 r6:eaad5d8c r5:851e4800 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ad500 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0493000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85173f8c r4:85173c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85173f8c r4:851b3580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e4800 r8:851b35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3580 r8:80287e08 r7:eaacde60 r6:851b3600 r5:851e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ad300 INFO: task kworker/1:136:4118 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 94117000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:137:4120 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:4120 tgid:4120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:851e5400 r4:851e5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:847c638c r4:847c6000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851e5400 r8:851b36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ad4c0 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:851e6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8517838c r4:85178000 r10:61c88647 r9:851e6000 r8:851b37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ad5c0 Call trace: 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:139:4123 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad1d84 r8:00000002 r7:60000013 r6:eaad1d8c r5:851e6c00 r4:851e6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ad940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0633000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517878c r4:85178400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517878c r4:851b3880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e6c00 r8:851b38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3880 r8:80287e08 r7:eaacde60 r6:851b3900 r5:851e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad1fb0 to 0xeaad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ad5c0 INFO: task kworker/1:139:4123 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 94b03000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:4127 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf1d84 r8:00000002 r7:60000013 r6:eaaf1d8c r5:84e00000 r4:84e00000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85201f8c r4:851a6880 Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eaaf5d84 r8:00000002 r7:60000113 r6:eaaf5d8c r5:84e02400 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85201b8c r4:85201800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851a6900 r8:80287e08 r7:eaaf1e60 r6:851b3a00 r5:84e02400 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 94f33000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:4130 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf9d84 r8:00000002 r7:60000013 r6:eaaf9d8c r5:84e03000 r4:84e03000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e03000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851add80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e03000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85178b8c r4:85178800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85178b8c r4:851b3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e03000 r8:851b3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3a80 r8:80287e08 r7:eaacde60 r6:851b3b00 r5:84e03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:4134 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaae5d84 r8:00000002 r7:60000013 r6:eaae5d8c r5:84e03c00 r4:84e03c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e03c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85195600 r4:00000000 r9:83018205 r8:84e03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:85179b8c r4:85179800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea93b000 r5:8517938c r4:85179000 r10:61c88647 r9:84e04800 r8:851b3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:143 state:D stack:0 pid:4136 tgid:4136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaae9d84 r8:00000002 r7:60000013 r6:eaae9d8c r5:84e05400 r4:84e05400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e05400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85195280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e05400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517978c r4:85179400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517978c r4:851b3d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e05400 r8:851b3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3d80 r8:80287e08 r7:eaae5e60 r6:851b3e00 r5:84e05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85195100 INFO: task kworker/1:143:4136 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 95c4a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84e06c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r9:83018205 r8:84e06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:85179f8c r4:85179c00 r10:61c88647 r9:84e06c00 r8:851b3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85195480 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:4140 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab09d84 r8:00000002 r7:60000113 r6:eab09d8c r5:84e06000 r4:84e06000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e06000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85195b80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e06000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab13000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517a38c r4:8517a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517a38c r4:851b3f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e06000 r8:851b3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3f80 r8:80287e08 r7:eab01e60 r6:8519d000 r5:84e06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851956c0 INFO: task kworker/1:145:4140 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 96120000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:851ebc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 r9:83018005 r8:851ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:847c6b8c r4:847c6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8520238c r4:85202000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520238c r4:851a6a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e8c00 r8:851a6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851a6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6a80 r8:80287e08 r7:eaaede60 r6:851a6b00 r5:851e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab05fb0 to 0xeab05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85194100 INFO: task kworker/0:365:4145 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9677d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:4147 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab29d84 r8:00000002 r7:60000013 r6:eab29d8c r5:851ed400 r4:851ed400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ed400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85195c80 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8517a78c r4:8517a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851ed400 r8:8519d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeab29fb0 to 0xeab29ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8517ab8c r4:8519d100 r4:8519d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d100 r8:80287e08 r7:eab29e60 r6:851a6c00 r5:851ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85195dc0 INFO: task kworker/1:147:4148 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9677d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:148:4150 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:148 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:851eec00 r4:851eec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851eec00 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8517b78c r4:8517b400 r7:ddde2d80 r6:83018200 r5:8517b78c r4:8519d180 Exception stack(0xeab39fb0 to 0xeab39ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8517af8c r4:8517ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 task:kworker/1:150 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eab59d84 r8:00000002 r7:60000113 r6:eab59d8c r5:84c26000 r4:84c26000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c26000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ab980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c26000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517b38c r4:8517b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517b38c r4:8519d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c26000 r8:8519d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d280 r8:80287e08 r7:eab39e60 r6:851a6d80 r5:84c26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851abd40 INFO: task kworker/1:150:4155 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 972b6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:4157 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:4157 tgid:4157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab71d84 r8:00000002 r7:60000013 r6:eab71d8c r5:84c30c00 r5:84c30c00 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eab67000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517bb8c r4:8517b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517bb8c r4:8519d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c30c00 r8:8519d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d300 r8:80287e08 r7:eab39e60 r6:851a6e00 r5:84c30c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851956c0 INFO: task kworker/1:151:4157 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 972b6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4159 blocked for more than 457 seconds. task:kworker/0:366 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847c778c r4:847c7400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851a6e80 Exception stack(0xeab7dfb0 to 0xeab7dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:84c32400 r4:84c32400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c32400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197180 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517bf8c r4:8517bc00 r7:ddde2d80 r6:83018200 r5:8517bf8c r4:8519d380 r4:00000001 r4:85195f80 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85278b8c r4:85278800 r10:61c88647 r9:84c33000 r8:8519d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85197100 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:4163 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:84c31800 r4:84c31800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c31800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c31800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab93000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527838c r4:85278000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527838c r4:8519d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c31800 r8:8519d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d480 r8:80287e08 r7:eab89e60 r6:8510c000 r5:84c31800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85197100 INFO: task kworker/1:154:4163 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 979ab000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:4165 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:84c33c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab9f000 r5:8527878c r4:85278400 r10:61c88647 r9:84c33c00 r8:8519d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:4167 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:84c34800 r4:84c34800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c34800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85278f8c r4:85278c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c34800 r8:8519d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851972c0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:84c35400 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:4171 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000013 r6:eabd9d8c r5:84c36000 r4:84c36000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c36000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c36000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527938c r4:85279000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527938c r4:8519d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c36000 r8:8519d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d680 r8:80287e08 r7:eabc9e60 r6:8510c200 r5:84c36000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851974c0 INFO: task kworker/1:158:4171 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8527978c r4:85279400 r10:61c88647 r9:851f8000 r8:8519d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85279b8c r4:85279800 r10:61c88647 r9:851f9800 r8:8519d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d780 r8:80287e08 r7:eabc9e60 r6:8510c300 r5:851f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85197980 INFO: task kworker/1:160:4175 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 98993000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:4177 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:4177 tgid:4177 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:851f8c00 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520278c r4:85202400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8519d800 r8:80287e08 r7:eabc9e60 r6:8510c380 r5:851f8c00 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:162:4179 blocked for more than 457 seconds. r4:851fbc00 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8527a38c r4:8527a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527a38c r4:8519d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fbc00 r8:8519d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d880 r8:80287e08 r7:eac09e60 r6:8510c400 r5:851fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851979c0 INFO: task kworker/1:162:4179 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 98e36000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:4181 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac21d84 r8:00000002 r7:60000013 r6:eac21d8c r5:851fb000 r4:851fb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527a78c r4:8527a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:00001000 r4:eceef000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac33000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ab8c r4:8527a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ab8c r4:8519d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fc800 r8:8519d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d980 r8:80287e08 r7:eac09e60 r6:8510c500 r5:851fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85197e00 INFO: task kworker/1:164:4183 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9954d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85138000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r5:00001000 r4:eac47000 r5:8527af8c r4:8527ac00 r7:ddde2d80 r6:83018200 r5:8527af8c r4:8519da00 r4:00000001 r4:85194a80 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:8513a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8527bf8c r4:8527bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 998a5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:4190 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa09d84 r8:00000002 r7:60000113 r6:eaa09d8c r5:8513bc00 r4:8513bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8513bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8513bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527b38c r4:8527b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527b38c r4:8519dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8513bc00 r8:8519dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519dc00 r8:80287e08 r7:eac31e60 r6:8519dc80 r5:8513bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f0100 INFO: task kworker/1:167:4190 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 998a5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:4192 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:85139800 r4:85139800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85139800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8527b78c r4:8527b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527b78c r4:8519dd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85139800 r8:8519dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8519dd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519dd00 r8:80287e08 r7:eac31e60 r6:8519dd80 r5:85139800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f0040 INFO: task kworker/1:168:4192 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8527bb8c r4:8527b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8519de00 r8:80287e08 r7:eac31e60 r6:8519de80 r5:85138c00 r4:850f0040 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8527c78c r4:8519df00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f06c0 INFO: task kworker/1:170:4196 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9a232000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:171:4198 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:171 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac65d84 r8:00000002 r7:60000013 r6:eac65d8c r5:8513d400 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8527c38c r4:8527c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527c38c r4:850ea000 r10:61c88647 r9:8513d400 r8:850ea02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8513e000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527cb8c r4:8527c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527cb8c r4:850ea100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8513e000 r8:850ea12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea100 r8:80287e08 r7:eab11e60 r6:850ea180 r5:8513e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f0a40 INFO: task kworker/1:172:4199 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9a7ed000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:173:4202 blocked for more than 457 seconds. r5:8513b000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8513b000 r8:850ea22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:174:4204 blocked for more than 457 seconds. r5:8513ec00 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8513ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0081000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527d78c r4:8527d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527d78c r4:850ea300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8513ec00 r8:850ea32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea300 r8:80287e08 r7:eac61e60 r6:850ea380 r5:8513ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac6dfb0 to 0xeac6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f0d80 INFO: task kworker/1:174:4204 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9add0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:4205 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac75d84 r8:00000002 r7:60000013 r6:eac75d8c r5:84e00c00 r4:84e00c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e00c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850ea400 r8:80287e08 r7:eac6de60 r6:850ea480 r5:84e00c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850f0d80 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:4208 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:84e01800 r4:84e01800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e01800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e01800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0405000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527db8c r4:8527d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527db8c r4:850ea500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e01800 r8:850ea52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea500 r8:80287e08 r7:eac6de60 r6:850ea580 r5:84e01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0080 INFO: task kworker/1:176:4208 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9b3f5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 INFO: task kworker/1:177:4210 blocked for more than 457 seconds. r4:85140000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85140000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0579000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e38c r4:8527e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527e38c r4:850ea600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85140000 r8:850ea62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea600 r8:80287e08 r7:eac71e60 r6:850ea680 r5:85140000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0180 INFO: task kworker/1:177:4210 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9b3f5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:4212 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:851fe000 r4:851fe000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fe000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0521000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527df8c r4:8527dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527df8c r4:850ea700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fe000 r8:850ea72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea700 r8:80287e08 r7:eac7de60 r6:8510c580 r5:851fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0280 INFO: task kworker/1:178:4212 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9b3f5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:851fa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0740 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851fa400 r8:850ea7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:851e8000 r4:851e8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ef8c r4:8527ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ef8c r4:850ea800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e8000 r8:850ea82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea800 r8:80287e08 r7:eac8de60 r6:8510c680 r5:851e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0540 INFO: task kworker/1:180:4216 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9b9ef000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:00001000 r4:eceef000 r5:8526a78c r4:8526a400 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84c36c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e08c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527eb8c r4:8527e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850ea880 r10:00000000 r9:850ea880 r8:80287e08 r7:eac95e60 r6:8510c700 r5:84c36c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9b9ef000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:4219 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca1d84 r8:00000002 r7:60000013 r6:eaca1d8c r5:852b8c00 r4:852b8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4857000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85284b8c r4:85284800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85284b8c r4:850ea900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b8c00 r8:850ea92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ea900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ea900 r8:80287e08 r7:eac95e60 r6:8510c780 r5:852b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0800 INFO: task kworker/1:182:4219 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9be68000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:4221 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:852b8000 r4:852b8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:e06ab000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8527f38c r4:850ea980 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852bb000 r8:850eaa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850eaa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eaa00 r8:80287e08 r7:eaca1e60 r6:8510c880 r5:852bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0940 INFO: task kworker/1:184:4223 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9c2cc000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:4225 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:852b9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527fb8c r4:8527f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850eaa80 r8:80287e08 r7:eaca1e60 r6:8510c900 r5:852b9800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d20: 9c749000 e004b000 00000001 80239b98 7f14b000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:00001000 r4:eceef000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:4227 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc1d84 r8:00000002 r7:60000113 r6:eacc1d8c r5:852ba400 r4:852ba400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ba400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0745000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ff8c r4:8527fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ff8c r4:850eab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ba400 r8:850eab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850eab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eab00 r8:80287e08 r7:eaca1e60 r6:8510c980 r5:852ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc1fb0 to 0xeacc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e0c40 INFO: task kworker/1:186:4227 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9c749000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:4229 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000013 r6:eacc9d8c r5:852bc800 r4:852bc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852bc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528438c r4:85284000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528438c r4:850eab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852bc800 r8:850eabac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850eab80 r8:80287e08 r7:eaca1e60 r6:8510ca00 r5:852bc800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9cf4f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:4232 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850eac00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 9cf4f000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:4236 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:852bd400 r4:852bd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852bd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c7040 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85284f8c r4:850eac80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:4239 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:84e10c00 r4:84e10c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e10c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c72c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88af000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528538c r4:85285000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528538c r4:850ead80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e10c00 r8:850eadac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ead80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ead80 r8:80287e08 r7:eacd9e60 r6:8510cc00 r5:84e10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 r4:850c7280 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:82ac21e4 r4:e00c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:4241 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:84e12400 r4:84e12400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e12400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c75c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e12400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85285b8c r4:85285800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85285b8c r4:850eae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e12400 r8:850eae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850eae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eae00 r8:80287e08 r7:eacd9e60 r6:8510cc80 r5:84e12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c7140 INFO: task kworker/1:192:4241 is blocked on a mutex likely owned by task kworker/1:93:3664. r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) task:kworker/1:193 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e11800 r8:850eaeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeacf1fb0 to 0xeacf1ff8) task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:4245 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:84e13000 r4:84e13000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e13000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c7840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e13000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528638c r4:85286000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528638c r4:850eaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e13000 r8:850eaf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850eaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eaf00 r8:80287e08 r7:eacf1e60 r6:8510cd80 r5:84e13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c7440 INFO: task kworker/1:194:4245 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9dfb1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8526a78c r4:8526a400 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe00c9fb0 to 0xe00c9ff8) r4:84fc4380 Not tainted 6.15.0-rc5-syzkaller #0 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c76c0 INFO: task kworker/1:195:4247 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9dfb1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:4249 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacfdd84 r8:00000002 r7:60000113 r6:eacfdd8c r5:84e15400 r4:84e15400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e15400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:197 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead05d84 r8:00000002 r7:60000113 r6:ead05d8c r5:84e16c00 r4:84e16c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e16c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c7f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528778c r4:85287400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528778c r4:850c1080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e16c00 r8:850c10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1080 r8:80287e08 r7:eacfde60 r6:8510cf00 r5:84e16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead05fb0 to 0xead05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c79c0 INFO: task kworker/1:197:4251 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9e59f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c7cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa45000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85286f8c r4:85286c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85286f8c r4:850c1100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e13c00 r8:850c112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1100 r8:80287e08 r7:ead05e60 r6:8510cf80 r5:84e13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c7c40 INFO: task kworker/1:198:4252 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9e59f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Exception stack(0xe00c9fb0 to 0xe00c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:852be000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c7dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852be000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa55000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528738c r4:85287000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528738c r4:850c1180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852be000 r8:850c11ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1180 r8:80287e08 r7:ead05e60 r6:850b2000 r5:852be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c7a40 INFO: task kworker/1:199:4254 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9eba5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:200:4257 blocked for more than 458 seconds. r10:8291a684 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:852c0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c7740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead21000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85287b8c r4:85287800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85287b8c r4:850c1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c0c00 r8:850c122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1200 r8:80287e08 r7:ead05e60 r6:850b2080 r5:852c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c7c00 INFO: task kworker/1:200:4257 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9eba5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:4260 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:201 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:852c0000 r4:852c0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197d00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead31000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85287f8c r4:85287c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85287f8c r4:850c1280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c0000 r8:850c12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1280 r8:80287e08 r7:ead29e60 r6:850b2100 r5:852c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85197ec0 INFO: task kworker/1:201:4260 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9edae000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:84fc4380 INFO: task kworker/1:202:4261 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:852c3000 r4:852c3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8200 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528838c r4:85288000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528838c r4:850c1300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c3000 r8:850c132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1300 r8:80287e08 r7:ead45e60 r6:850b2180 r5:852c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead49fb0 to 0xead49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cb800 INFO: task kworker/1:202:4261 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9edae000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000000 r5:00001000 r4:eceef000 r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:4265 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:852c2400 r4:852c2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead51000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528878c r4:85288400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528878c r4:850c1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c2400 r8:850c142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1400 r8:80287e08 r7:ead59e60 r6:850b2280 r5:852c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8080 INFO: task kworker/1:204:4265 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9f1de000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:4266 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:4266 tgid:4266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000013 r6:ead6dd8c r5:852c5400 r4:852c5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8180 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead61000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85288b8c r4:85288800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85288b8c r4:850c1480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c5400 r8:850c14ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1480 r8:80287e08 r7:ead59e60 r6:850b2300 r5:852c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8180 INFO: task kworker/1:205:4266 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9fd83000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:4269 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea98dd84 r8:00000002 r7:60000113 r6:ea98dd8c r5:852c3c00 r4:852c3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85288f8c r4:85288c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85288f8c r4:850c1500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c3c00 r8:850c152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1500 r8:80287e08 r7:ead59e60 r6:850b2380 r5:852c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528938c r4:85289000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528938c r4:850c1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c6000 r8:850c15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1580 r8:80287e08 r7:ea98de60 r6:850b2400 r5:852c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b85c0 INFO: task kworker/1:207:4271 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: 9fd83000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 r5:852c6c00 r4:8291a680 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852c6c00 r8:850c162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r4:e00c9dc0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8528b38c r4:850c1680 r4:850c1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1680 r8:80287e08 r7:eab0de60 r6:850b2500 r5:84e16000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8680 INFO: task kworker/1:209:4275 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a0264000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:4276 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:4278 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:84ed0c00 r4:84ed0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ed0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85289f8c r4:85289c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85289f8c r4:850c1780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed0c00 r8:850c17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1780 r8:80287e08 r7:eab25e60 r6:850b2600 r5:84ed0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d20: a0264000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Workqueue: events bpf_prog_free_deferred [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:00001000 r4:eceef000 r4:00000001 INFO: task kworker/1:213:4282 blocked for more than 458 seconds. r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ed3000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528a78c r4:8528a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528a78c r4:850c1880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed3000 r8:850c18ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1880 r8:80287e08 r7:eab25e60 r6:850b2700 r5:84ed3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8b40 INFO: task kworker/1:213:4282 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a0f23000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4284 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:84ed0000 r4:84ed0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b8f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ed0000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528ab8c r4:8528a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528ab8c r4:850c1900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed0000 r8:850c192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1900 r8:80287e08 r7:eab25e60 r6:850b2780 r5:84ed0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8840 INFO: task kworker/1:214:4284 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a0f23000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:4286 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc5d84 r8:00000002 r7:60000013 r6:eacc5d8c r5:85143000 r4:85143000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85143000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fd700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85143000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528af8c r4:8528ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528af8c r4:850c1980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85143000 r8:850c19ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1980 r8:80287e08 r7:eab25e60 r6:850c1a00 r5:85143000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b8e00 INFO: task kworker/1:215:4286 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a119c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:4288 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:85145400 r4:85145400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85145400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe3040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85145400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0483000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528b78c r4:8528b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528b78c r4:850c1a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85145400 r8:850c1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1a80 r8:80287e08 r7:eab25e60 r6:850c1b00 r5:85145400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cbe40 INFO: task kworker/1:216:4288 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a119c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:4291 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:85146000 r4:85146000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85146000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe3440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85146000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528bf8c r4:8528bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528bf8c r4:850c1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85146000 r8:850c1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1b80 r8:80287e08 r7:eabd5e60 r6:850c1c00 r5:85146000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe3080 INFO: task kworker/1:217:4291 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a15a5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4294 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:84ed4800 r4:84ed4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe3340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ed4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528bb8c r4:8528b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528bb8c r4:850c1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed4800 r8:850c1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1c80 r8:80287e08 r7:eabede60 r6:850b2800 r5:84ed4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe31c0 INFO: task kworker/1:218:4294 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a15a5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84ed6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe36c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ed6000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0733000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529078c r4:85290400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529078c r4:850c1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed6000 r8:850c1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1d80 r8:80287e08 r7:eac5de60 r6:850b2900 r5:84ed6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850c1e00 r8:80287e08 r7:ead85e60 r6:850c1e80 r5:85146c00 Exception stack(0xe00c9d28 to 0xe00c9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:4301 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac79d84 r8:00000002 r7:60000013 r6:eac79d8c r5:85144800 r4:85144800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85144800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85290b8c r4:85290800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85290b8c r4:850c1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85144800 r8:850c1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850c1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c1f00 r8:80287e08 r7:eabf5e60 r6:850c1f80 r5:85144800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe34c0 INFO: task kworker/1:222:4301 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a2392000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85143c00 r8:84fd302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:224:4305 blocked for more than 458 seconds. r5:85142400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc1300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85142400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529278c r4:85292400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529278c r4:84fd3100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85142400 r8:84fd312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3100 r8:80287e08 r7:ead89e60 r6:84fd3180 r5:85142400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe3980 INFO: task kworker/1:224:4305 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a2392000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:4307 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: a2861000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9b3000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85140c00 r8:84fd332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:227:4311 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:851fd400 r4:851fd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe3fc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa17000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85291f8c r4:85291c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85291f8c r4:84fd3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fd400 r8:84fd342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3400 r8:80287e08 r7:ead91e60 r6:84fd3480 r5:851fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe3dc0 INFO: task kworker/1:227:4311 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a2ed9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:228:4312 blocked for more than 458 seconds. r4:852f0000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc1040 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fd3500 Exception stack(0xeada1fb0 to 0xeada1ff8) r4:84fe3dc0 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:00001000 r4:eceef000 r4:84fbb200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:852f0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc1600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab49000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85292b8c r4:85292800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85292b8c r4:84fd3600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f0c00 r8:84fd362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3600 r8:80287e08 r7:ead91e60 r6:84fd3680 r5:852f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc1080 INFO: task kworker/1:229:4315 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a337e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:230:4316 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:852f2400 r4:852f2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fca580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab73000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520378c r4:85203400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520378c r4:84fd3700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f2400 r8:84fd372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3700 r8:80287e08 r7:eada5e60 r6:84fd3780 r5:852f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc1080 INFO: task kworker/1:230:4316 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a337e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fd3800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4321 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000013 r6:eadb5d8c r5:84ed6c00 r4:84ed6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc1800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ed6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85292f8c r4:85292c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85292f8c r4:84fd3880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed6c00 r8:84fd38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc4380 task:kworker/1:234 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:852f3c00 r4:852f3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc1a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529378c r4:85293400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529378c r4:84fd3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f3c00 r8:84fd3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3a00 r8:80287e08 r7:eadb1e60 r6:84fd3a80 r5:852f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc17c0 INFO: task kworker/1:234:4326 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a4411000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: a4411000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529938c r4:85299000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529938c r4:84fd3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f5400 r8:84fd3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3c00 r8:80287e08 r7:eadb1e60 r6:84fd3c80 r5:852f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc1fb0 to 0xeadc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc1c80 INFO: task kworker/1:236:4330 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a49b5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852f6000 r8:84fd3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:4333 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc5d84 r8:00000002 r7:60000013 r6:eadc5d8c r5:852f6c00 r4:852f6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe3ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529878c r4:85298400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529878c r4:84fd3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f6c00 r8:84fd3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd3e00 r8:80287e08 r7:eadc1e60 r6:84fd3e80 r5:852f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:852f1800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac2d000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fd3f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: a4f58000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4339 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000013 r6:eadd9d8c r5:851fec00 r4:851fec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fac300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac45000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85298f8c r4:85298c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85298f8c r4:84fb1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fec00 r8:84fb102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1000 r8:80287e08 r7:eadc1e60 r6:84fb1100 r5:851fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fac2c0 INFO: task kworker/1:240:4339 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a53cf000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 INFO: task kworker/1:241:4340 blocked for more than 458 seconds. r5:852f8000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529978c r4:85299400 r10:61c88647 r9:852f8000 r8:84fb10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84fac4c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) r4:00000000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:242:4342 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:852f8c00 r4:852f8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fac780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85299b8c r4:85299800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85299b8c r4:84fb1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f8c00 r8:84fb122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1200 r8:80287e08 r7:eadd1e60 r6:84fb1280 r5:852f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fac4c0 INFO: task kworker/1:242:4342 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a596b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:243:4344 blocked for more than 459 seconds. r5:852f9800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:4345 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae01d84 r8:00000002 r7:60000113 r6:eae01d8c r5:852fa400 r4:852fa400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fa400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85299f8c r4:85299c00 r10:61c88647 r9:852fa400 r8:84fb142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 r7:ddde2d80 r6:83018200 r5:8529a38c r4:84fb1500 r4:84fb1500 r10:00000000 r9:84fb1500 r8:80287e08 r7:eade9e60 r6:84fb1580 r5:852fbc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:246:4349 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4349 tgid:4349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaccdd84 r8:00000002 r7:60000113 r6:eaccdd8c r5:852fc800 r4:852fc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84face00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df997000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a78c r4:8529a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529a78c r4:84fb1600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fc800 r8:84fb162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1600 r8:80287e08 r7:eade9e60 r6:84fb1680 r5:852fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fac9c0 INFO: task kworker/1:246:4349 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a68d5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852d8c00 r8:84fb172c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:4354 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:852d9800 r4:852d9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852d9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f5b340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0063000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529bb8c r4:8529b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529bb8c r4:84fb1780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852d9800 r8:84fb17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1780 r8:80287e08 r7:ead01e60 r6:850b2b00 r5:852d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a2040 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000000 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc5-syzkaller #0 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529b38c r4:8529b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529b38c r4:84fb1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852db000 r8:84fb182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1800 r8:80287e08 r7:ead35e60 r6:850b2b80 r5:852db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a2040 INFO: task kworker/1:249:4355 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a73df000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:dfec1000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529b78c r4:8529b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529b78c r4:84fb1880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852da400 r8:84fb18ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1880 r8:80287e08 r7:ead35e60 r6:850b2c00 r5:852da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f5b000 INFO: task kworker/1:250:4357 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a7754000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4359 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae21d84 r8:00000002 r7:60000013 r6:eae21d8c r5:852dbc00 r4:852dbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852dbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a438c r4:852a4000 r7:ddde2d80 r6:83018200 r5:852a438c r4:84fb1900 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00c9d28 to 0xe00c9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:252 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f5b480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529bf8c r4:8529bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529bf8c r4:84fb1980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852dc800 r8:84fb19ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1980 r8:80287e08 r7:eae21e60 r6:850b2d00 r5:852dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae29fb0 to 0xeae29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f5b380 INFO: task kworker/1:252:4361 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a7cab000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:4363 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:852fd400 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:852a4f8c r4:84fb1a00 r10:00000000 r9:84fb1a00 r8:80287e08 r7:eae21e60 r6:84fb1a80 r5:852fd400 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:254 state:D stack:0 pid:4366 tgid:4366 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:e05a1000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fb1b00 Exception stack(0xeae4dfb0 to 0xeae4dff8) task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:4368 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:4368 tgid:4368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:852fec00 r4:852fec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f5b840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a4b8c r4:852a4800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a4b8c r4:84fb1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fec00 r8:84fb1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1c00 r8:80287e08 r7:eadf5e60 r6:84fb1c80 r5:852fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f5b780 INFO: task kworker/1:255:4368 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:e00c9dc0 r5:00001000 r4:eceef000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:852fb000 r4:8291a680 r4:00000000 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:852a5f8c r4:84fb1d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a835f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:4372 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae59d84 r8:00000002 r7:60000013 r6:eae59d8c r5:85308000 r4:85308000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85308000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f5bb00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a538c r4:852a5000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a538c r4:84fb1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85308000 r8:84fb1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fb1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fb1e00 r8:80287e08 r7:eae55e60 r6:84fb1e80 r5:85308000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f5b900 INFO: task kworker/1:257:4372 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a835f000 e004b000 00000001 80239b98 7f14b000 00000001 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:4374 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:4374 tgid:4374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae5dd84 r8:00000002 r7:60000013 r6:eae5dd8c r5:85308c00 r4:85308c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85308c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f5b900 r4:00000000 r5:00001000 r4:e0715000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a578c r4:852a5400 r10:61c88647 r9:85308c00 r8:84fb1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:4376 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85309800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4378 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4378 tgid:4378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:8530a400 r4:8530a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fca900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8530a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4831000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a638c r4:852a6000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a638c r4:84f40100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530a400 r8:84f4012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40100 r8:80287e08 r7:eae55e60 r6:84f40180 r5:8530a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8530bc00 r8:84f4022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40200 r8:80287e08 r7:eae65e60 r6:84f40280 r5:8530bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f5bf40 INFO: task kworker/1:261:4381 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: a9600000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:262:4382 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a6b8c r4:852a6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:e00c9dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4383 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:8530d400 r4:8530d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8530d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea901000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a6f8c r4:852a6c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a6f8c r4:84f40400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530d400 r8:84f4042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40400 r8:80287e08 r7:eae6de60 r6:84f40480 r5:8530d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae71fb0 to 0xeae71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f5bf40 INFO: task kworker/1:263:4383 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8530e000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a7b8c r4:852a7800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a7b8c r4:84f40500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530e000 r8:84f4052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40500 r8:80287e08 r7:eae71e60 r6:84f40580 r5:8530e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae69fb0 to 0xeae69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d340 INFO: task kworker/1:264:4387 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852a738c r4:852a7000 r10:61c88647 r9:8530ec00 r8:84f4062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f3d380 Call trace: 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4391 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae7dd84 r8:00000002 r7:60000113 r6:eae7dd8c r5:8530b000 r4:8530b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d6c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8530b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a778c r4:852a7400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a778c r4:84f40700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530b000 r8:84f4072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40700 r8:80287e08 r7:eae69e60 r6:84f40780 r5:8530b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d840 INFO: task kworker/1:266:4391 is blocked on a mutex likely owned by task kworker/1:93:3664. r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:00001000 r4:eceef000 r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85300000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r5:00001000 r4:e06a3000 r5:852b2f8c r4:852b2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:852a7f8c r4:84f40900 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d780 INFO: task kworker/1:268:4395 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: aaaa7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4396 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae89d84 r8:00000002 r7:60000013 r6:eae89d8c r5:85302400 r4:85302400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85302400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r5:852b038c r4:852b0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85302400 r8:84f40a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:85303000 r4:85303000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85303000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3ddc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85303000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852b078c r4:852b0400 r4:84f40b00 INFO: task kworker/1:270:4398 is blocked on a mutex likely owned by task kworker/1:93:3664. r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4401 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b0b8c r4:852b0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:4402 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeb5d84 r8:00000002 r7:60000113 r6:eaeb5d8c r5:852dd400 r4:852dd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852dd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eacbb000 r5:852b0f8c r4:852b0c00 r10:00000000 r9:84f40c80 r8:80287e08 r7:eae81e60 r6:850b2e00 r5:852dd400 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eaebdd84 r8:00000002 r7:60000113 r6:eaebdd8c r5:852dec00 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eaceb000 r5:852b138c r4:852b1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b138c r4:84f40d80 r10:61c88647 r9:852dec00 r8:84f40dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40d80 r8:80287e08 r7:eae81e60 r6:850b2e80 r5:852dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb5300 INFO: task kworker/1:273:4404 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ab9ec000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:4406 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:852d8000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:852b178c r4:852b1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852d8000 r8:84f40d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:800f0113 r4:80239bb0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 r4:84ed5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852b1b8c r4:852b1800 r4:84f40e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40e00 r8:80287e08 r7:eae81e60 r6:850b2f80 r5:84ed5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb5380 INFO: task kworker/1:275:4408 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: abe77000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:4410 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:4410 tgid:4410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:84c00c00 r4:84c00c00 r5:84c00c00 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:852b1f8c r4:852b1c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c00c00 r8:84f40eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84c00000 r4:84c00000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c00000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc6640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c00000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0413000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b238c r4:852b2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b238c r4:84f40f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c00000 r8:84f40f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f40f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f40f00 r8:80287e08 r7:eae81e60 r6:8473a080 r5:84c00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb5500 INFO: task kworker/1:277:4412 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ac311000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84c03000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r5:852b278c r4:852b2400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84f40f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/0:367:4416 blocked for more than 459 seconds. r4:85303c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r5:00001000 r4:dfcc7000 r5:847c738c r4:847c7000 r7:dddced80 r6:83018000 r5:847c738c r4:8473a100 r10:00000000 r9:8473a100 r8:80287e08 r7:eaaede60 r6:84735080 r5:85303c00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d000 INFO: task kworker/0:367:4416 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ac724000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4420 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85304800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r9:83018005 r8:85304800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r5:847c6f8c r4:847c6c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8473a180 r8:80287e08 r7:eaaede60 r6:84735100 r5:85304800 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85305400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:8523038c r4:85230000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523038c r4:8473a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85305400 r8:8473a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473a200 r8:80287e08 r7:eaaede60 r6:84735180 r5:85305400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d5c0 INFO: task kworker/0:369:4423 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: acd6b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 Exception stack(0xe00c9fb0 to 0xe00c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4424 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:85306c00 r4:85306c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85306c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472db80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85306c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ad000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85230b8c r4:85230800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85230b8c r4:8473a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306c00 r8:8473a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473a280 r8:80287e08 r7:eab65e60 r6:84735200 r5:85306c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d800 INFO: task kworker/0:370:4424 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 r4:e00c9dc0 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:371:4426 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:85306000 r4:85306000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85306000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472da00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85306000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523078c r4:85230400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523078c r4:8473a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306000 r8:8473a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473a300 r8:80287e08 r7:eab6de60 r6:84735280 r5:85306000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d940 INFO: task kworker/0:371:4426 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ad1c3000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ad1c3000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85230f8c r4:85230c00 r10:61c88647 r9:85310000 r8:8473a42c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472de00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85313000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0645000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523138c r4:85231000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523138c r4:8473a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313000 r8:8473a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473a480 r8:80287e08 r7:eae0de60 r6:84735400 r5:85313000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472db40 INFO: task kworker/0:374:4432 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:84fbb200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85312400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472df40 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: adf95000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:4436 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:84c01800 r4:84c01800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c01800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472d400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c01800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea92d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85231b8c r4:85231800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85231b8c r4:8473a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c01800 r8:8473a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473a580 r8:80287e08 r7:eae0de60 r6:8473a600 r5:84c01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472ddc0 INFO: task kworker/0:376:4436 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: adf95000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85231f8c r4:85231c00 r10:61c88647 r9:84c03c00 r8:8473a6ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:4441 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:84c04800 r4:84c04800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c04800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523278c r4:85232400 r10:61c88647 r9:84c04800 r8:8473a7ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ae745000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 r4:84c05400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85232f8c r4:85232c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: aebe4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f354c0 r5:85232b8c r4:85232800 r7:dddced80 r6:83018000 r5:85232b8c r4:8473a980 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84f35240 INFO: task kworker/0:380:4444 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: aebe4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 Workqueue: events bpf_prog_free_deferred r5:84c06c00 r4:8291a680 r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab75000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523338c r4:85233000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523338c r4:8473aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c06c00 r8:8473aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473aa80 r8:80287e08 r7:eaf45e60 r6:8473ab00 r5:84c06c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35500 INFO: task kworker/0:381:4447 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: af003000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4449 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf5dd84 r8:00000002 r7:60000113 r6:eaf5dd8c r5:85311800 r4:85311800 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852b2b8c r4:852b2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b2b8c r4:84735500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84735500 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:279:4449 is blocked on a mutex likely owned by task kworker/1:93:3664. r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:eceef000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4450 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85315400 r4:85315400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85315400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85315400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523378c r4:85233400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523378c r4:8473ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85315400 r8:8473abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ab80 r8:80287e08 r7:eaf4de60 r6:84735600 r5:85315400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf61fb0 to 0xeaf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35740 INFO: task kworker/0:382:4450 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: af4e8000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4452 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:85314800 r4:85314800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85314800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85314800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabfb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523478c r4:85234400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523478c r4:8473ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85314800 r8:8473ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ac00 r8:80287e08 r7:eaf61e60 r6:84735680 r5:85314800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35780 INFO: task kworker/0:383:4452 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: af788000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4453 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf6dd84 r8:00000002 r7:60000013 r6:eaf6dd8c r5:85313c00 r4:85313c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85313c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85313c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85233b8c r4:85233800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85233b8c r4:8473ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313c00 r8:8473acac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ac80 r8:80287e08 r7:eaf69e60 r6:84735700 r5:85313c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35780 INFO: task kworker/0:384:4453 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: afaa2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4455 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:85316000 r4:85316000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85316000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85316000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85233f8c r4:85233c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85233f8c r4:8473ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85316000 r8:8473ad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ad00 r8:80287e08 r7:eaf69e60 r6:84735780 r5:85316000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35940 INFO: task kworker/0:385:4455 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: afdb1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:4457 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:4457 tgid:4457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:85318000 r4:85318000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85318000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85318000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523438c r4:85234000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523438c r4:8473ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318000 r8:8473adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ad80 r8:80287e08 r7:eaf69e60 r6:84735800 r5:85318000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35a80 INFO: task kworker/0:386:4457 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: afdb1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4460 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000013 r6:eaf89d8c r5:8531a400 r4:8531a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8531a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85235f8c r4:85235c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85235f8c r4:8473ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531a400 r8:8473ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ae00 r8:80287e08 r7:eaf69e60 r6:84735880 r5:8531a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35bc0 INFO: task kworker/0:387:4460 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b0109000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4461 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000113 r6:eaf8dd8c r5:85318c00 r4:85318c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85318c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f35f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85318c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85234b8c r4:85234800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85234b8c r4:8473ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318c00 r8:8473aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ae80 r8:80287e08 r7:eaf89e60 r6:84735900 r5:85318c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f35ec0 INFO: task kworker/0:388:4461 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b0109000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:4463 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:85319800 r4:85319800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85319800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3dfc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85319800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac19000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85234f8c r4:85234c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85234f8c r4:8473af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85319800 r8:8473afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473af80 r8:80287e08 r7:eaf89e60 r6:84735980 r5:85319800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3dfc0 INFO: task kworker/0:389:4463 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b07f4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:4465 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf9dd84 r8:00000002 r7:60000113 r6:eaf9dd8c r5:8531b000 r4:8531b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f53ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8531b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac35000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523538c r4:85235000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523538c r4:8473af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531b000 r8:8473af2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473af00 r8:80287e08 r7:eaf89e60 r6:84735a00 r5:8531b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f53f40 INFO: task kworker/0:390:4465 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b07f4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4467 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:8531d400 r4:8531d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8531d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523578c r4:85235400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523578c r4:84f55000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531d400 r8:84f5502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55000 r8:80287e08 r7:eaf89e60 r6:84735a80 r5:8531d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f53f40 INFO: task kworker/0:391:4467 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b0a15000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4469 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:8531c800 r4:8531c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8531c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85235b8c r4:85235800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85235b8c r4:84f55080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531c800 r8:84f550ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55080 r8:80287e08 r7:eaf89e60 r6:84735b00 r5:8531c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f570c0 INFO: task kworker/0:392:4469 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b0d50000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:4470 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf55d84 r8:00000002 r7:60000113 r6:eaf55d8c r5:852c1800 r4:852c1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:852c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead77000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523678c r4:85236400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523678c r4:84f55100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c1800 r8:84f5512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55100 r8:80287e08 r7:eaf89e60 r6:84f55180 r5:852c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f57100 INFO: task kworker/0:393:4470 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1051000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:4474 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb1d84 r8:00000002 r7:60000113 r6:eafb1d8c r5:85360000 r4:85360000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85360000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85360000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead65000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523638c r4:85236000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523638c r4:84f55200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85360000 r8:84f5522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55200 r8:80287e08 r7:eaf55e60 r6:84f55280 r5:85360000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb1fb0 to 0xeafb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f57400 INFO: task kworker/0:394:4474 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1051000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4475 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000013 r6:eafb5d8c r5:85360c00 r4:85360c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85360c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85360c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523738c r4:85237000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523738c r4:84f55300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85360c00 r8:84f5532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55300 r8:80287e08 r7:eaf55e60 r6:84f55380 r5:85360c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f57400 INFO: task kworker/0:395:4475 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1672000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4479 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:85361800 r4:85361800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85361800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85361800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85236b8c r4:85236800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85236b8c r4:84f55400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85361800 r8:84f5542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55400 r8:80287e08 r7:eafb5e60 r6:84f55480 r5:85361800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb9fb0 to 0xeafb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f576c0 INFO: task kworker/0:396:4479 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1948000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4480 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:4480 tgid:4480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:85362400 r4:85362400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85362400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85362400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85236f8c r4:85236c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85236f8c r4:84f55500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85362400 r8:84f5552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55500 r8:80287e08 r7:eafb5e60 r6:84f55580 r5:85362400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f576c0 INFO: task kworker/0:397:4480 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1948000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4482 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc5d84 r8:00000002 r7:60000113 r6:eafc5d8c r5:85363000 r4:85363000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85363000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85363000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523778c r4:85237400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523778c r4:84f55600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85363000 r8:84f5562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55600 r8:80287e08 r7:eafb5e60 r6:84f55680 r5:85363000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f579c0 INFO: task kworker/0:398:4482 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1dc6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:4485 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc9d84 r8:00000002 r7:60000013 r6:eafc9d8c r5:85363c00 r4:85363c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85363c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85363c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae45000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85237b8c r4:85237800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85237b8c r4:84f55700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85363c00 r8:84f5572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55700 r8:80287e08 r7:eafc5e60 r6:84f55780 r5:85363c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f57c00 INFO: task kworker/0:399:4485 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1dc6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:4486 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf51d84 r8:00000002 r7:60000013 r6:eaf51d8c r5:85364800 r4:85364800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85364800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb2100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85364800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a038c r4:853a0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a038c r4:84f55800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85364800 r8:84f5582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55800 r8:80287e08 r7:eafc9e60 r6:84f55880 r5:85364800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f57c00 INFO: task kworker/0:400:4486 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b1dc6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:4487 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:85365400 r4:85365400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85365400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f57f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85365400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85237f8c r4:85237c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85237f8c r4:84f55900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85365400 r8:84f5592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55900 r8:80287e08 r7:eaf51e60 r6:84f55980 r5:85365400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f57c00 INFO: task kworker/0:401:4487 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b2776000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4490 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:85366000 r4:85366000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85366000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb2440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85366000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0b8c r4:853a0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0b8c r4:84f55a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85366000 r8:84f55a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55a00 r8:80287e08 r7:eaf51e60 r6:84f55a80 r5:85366000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd5fb0 to 0xeafd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb21c0 INFO: task kworker/0:402:4490 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b2776000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:853a078c r4:84f55b00 r4:84f55b00 Exception stack(0xeafd9fb0 to 0xeafd9ff8) r4:84fb2080 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4495 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4495 tgid:4495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead19d84 r8:00000002 r7:60000113 r6:ead19d8c r5:84600000 r4:84600000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84600000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb25c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84600000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa65000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0f8c r4:853a0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0f8c r4:84f55c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84600000 r8:84f55c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55c00 r8:80287e08 r7:eafd5e60 r6:84f55c80 r5:84600000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb22c0 INFO: task kworker/0:404:4495 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b2e60000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:4496 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84600c00 r8:84f55d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:4498 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:84601800 r4:84601800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84601800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb2a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84601800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1b8c r4:853a1800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1b8c r4:84f55e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84601800 r8:84f55e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f55e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f55e00 r8:80287e08 r7:eafdde60 r6:84f55e80 r5:84601800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d20: b3224000 e004b000 00000001 80239b98 7f14b000 00000001 r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:4501 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:84602400 r4:84602400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84602400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb28c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84602400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r5:00001000 r4:dfe85000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a178c r4:853a1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84f55f00 r8:80287e08 r7:eafe1e60 r6:84f55f80 r5:84602400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d20: b35d4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:4502 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000013 r6:eafe9d8c r5:84603000 r4:84603000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84603000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84603000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3b8c r4:853a3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3b8c r4:84fc7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84603000 r8:84fc702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7000 r8:80287e08 r7:eafe1e60 r6:84fc7080 r5:84603000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/0:409:4504 blocked for more than 460 seconds. r5:84604800 r4:8291a680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84604800 r8:84fc712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:410:4507 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:410 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:84606000 r4:84606000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84606000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84606000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4851000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2b8c r4:853a2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2b8c r4:84fc7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84606000 r8:84fc722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7200 r8:80287e08 r7:eafe9e60 r6:84735c00 r5:84606000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb2e40 INFO: task kworker/0:410:4507 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b4189000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e4826000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8531bc00 r8:84735bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc66c0 INFO: task kworker/1:280:4508 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b4189000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:4510 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:4510 tgid:4510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:8531ec00 r4:8531ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc6a40 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:852b338c r4:84735d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 r5:00001000 r4:eceef000 r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:282:4513 blocked for more than 460 seconds. r5:8531e000 r4:8291a680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84735e00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc68c0 INFO: task kworker/1:282:4513 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b4982000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4515 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb009d84 r8:00000002 r7:60000013 r6:eb009d8c r5:84c02400 r4:84c02400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c02400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c400 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533e38c r4:8533e000 r10:61c88647 r9:84c02400 r8:84735f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r5:00001000 r4:ea9fb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b378c r4:852b3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b378c r4:84fbe000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85300c00 r8:84fbe02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbe000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbe000 r8:80287e08 r7:eb009e60 r6:84fbe080 r5:85300c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc6ac0 INFO: task kworker/1:284:4516 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b4d03000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4518 blocked for more than 460 seconds. [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85368000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88a3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2f8c r4:853a2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2f8c r4:84fc7280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85368000 r8:84fc72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7280 r8:80287e08 r7:eafe9e60 r6:84fbe100 r5:85368000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb51c0 INFO: task kworker/0:411:4518 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b4d03000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:4521 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb021d84 r8:00000002 r7:60000013 r6:eb021d8c r5:8536a400 r4:8536a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5240 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a338c r4:853a3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a338c r4:84fc7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536a400 r8:84fc732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7300 r8:80287e08 r7:eafe9e60 r6:84fbe180 r5:8536a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb55c0 INFO: task kworker/0:412:4521 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b5bd2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:4522 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:85368c00 r4:85368c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85368c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85368c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea923000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a378c r4:853a3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a378c r4:84fc7380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85368c00 r8:84fc73ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7380 r8:80287e08 r7:eafe9e60 r6:84fbe200 r5:85368c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5400 INFO: task kworker/0:413:4522 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b5bd2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4525 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:8536c800 r4:8536c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536c800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3f8c r4:853a3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3f8c r4:84fc7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536c800 r8:84fc742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7400 r8:80287e08 r7:eafe9e60 r6:84fbe280 r5:8536c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5580 INFO: task kworker/0:414:4525 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b5bd2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4527 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb035d84 r8:00000002 r7:60000013 r6:eb035d8c r5:8536bc00 r4:8536bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a8b8c r4:853a8800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a8b8c r4:84fc7480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536bc00 r8:84fc74ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7480 r8:80287e08 r7:eb02de60 r6:84fbe300 r5:8536bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5840 INFO: task kworker/0:415:4527 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b6421000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:4529 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:8536b000 r4:8536b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a838c r4:853a8000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a838c r4:84fc7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536b000 r8:84fc75ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7580 r8:80287e08 r7:eb035e60 r6:84fbe380 r5:8536b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb57c0 INFO: task kworker/0:416:4529 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b6421000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:4531 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb045d84 r8:00000002 r7:60000013 r6:eb045d8c r5:85369800 r4:85369800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85369800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85369800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a878c r4:853a8400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a878c r4:84fc7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85369800 r8:84fc752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7500 r8:80287e08 r7:eb035e60 r6:84fbe400 r5:85369800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5900 INFO: task kworker/0:417:4531 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b6421000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:4533 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:8536d400 r4:8536d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a8f8c r4:853a8c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a8f8c r4:84fc7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536d400 r8:84fc762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7600 r8:80287e08 r7:eb035e60 r6:84fbe480 r5:8536d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5980 INFO: task kworker/0:418:4533 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b66a7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4534 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:8536ec00 r4:8536ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc05c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8536ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b3b8c r4:852b3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b3b8c r4:84fbe500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536ec00 r8:84fbe52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbe500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbe500 r8:80287e08 r7:eb009e60 r6:84fbe580 r5:8536ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc0440 INFO: task kworker/1:285:4534 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b6aeb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4537 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:85316c00 r4:85316c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85316c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc0a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85316c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead37000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b3f8c r4:852b3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b3f8c r4:84fbe600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85316c00 r8:84fbe62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbe600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbe600 r8:80287e08 r7:eb009e60 r6:84fbe680 r5:85316c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc0680 INFO: task kworker/1:286:4537 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b6e2d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4538 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb059d84 r8:00000002 r7:60000013 r6:eb059d8c r5:85320000 r4:85320000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85320000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc6380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85320000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a9b8c r4:853a9800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a9b8c r4:84fc7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320000 r8:84fc76ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7680 r8:80287e08 r7:eb049e60 r6:84fbe700 r5:85320000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5c80 INFO: task kworker/0:419:4538 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b718a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:4540 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:84605400 r4:84605400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84605400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb50c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84605400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a938c r4:853a9000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a938c r4:84fc7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84605400 r8:84fc772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7700 r8:80287e08 r7:eb059e60 r6:84fc7780 r5:84605400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5c80 INFO: task kworker/0:420:4540 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b7373000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:4543 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:4543 tgid:4543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:84603c00 r4:84603c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84603c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb5dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84603c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a978c r4:853a9400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a978c r4:84fc7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84603c00 r8:84fc782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7800 r8:80287e08 r7:eb059e60 r6:84fc7880 r5:84603c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb5080 INFO: task kworker/0:421:4543 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b7715000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4546 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000113 r6:eb05dd8c r5:84606c00 r4:84606c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84606c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84606c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aa38c r4:853aa000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aa38c r4:84fc7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84606c00 r8:84fc792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7900 r8:80287e08 r7:eb059e60 r6:84fc7980 r5:84606c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc6200 INFO: task kworker/0:422:4546 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b794b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:4547 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:8536e000 r4:8536e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb5740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536e000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a9f8c r4:853a9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a9f8c r4:84fc7a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536e000 r8:84fc7a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7a00 r8:80287e08 r7:eb05de60 r6:84fc7a80 r5:8536e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb5400 INFO: task kworker/0:423:4547 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b7ac4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4550 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:85378000 r4:85378000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85378000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4500 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85378000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aab8c r4:853aa800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aab8c r4:84fc7b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85378000 r8:84fc7b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7b00 r8:80287e08 r7:eb05de60 r6:84fc7b80 r5:85378000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4080 INFO: task kworker/0:424:4550 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b7caf000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:4551 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:85378c00 r4:85378c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85378c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85378c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aa78c r4:853aa400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aa78c r4:84fc7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85378c00 r8:84fc7c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7c00 r8:80287e08 r7:eb065e60 r6:84fc7c80 r5:85378c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4240 INFO: task kworker/0:425:4551 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b7e45000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:4554 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab55d84 r8:00000002 r7:60000113 r6:eab55d8c r5:85379800 r4:85379800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85379800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85379800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aaf8c r4:853aac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aaf8c r4:84fc7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85379800 r8:84fc7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7d00 r8:80287e08 r7:eb065e60 r6:84fc7d80 r5:85379800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4180 INFO: task kworker/0:426:4554 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b7f51000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:4555 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:85320c00 r4:85320c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85320c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac200 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533c38c r4:8533c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533c38c r4:84fbe780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320c00 r8:84fbe7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbe780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbe780 r8:80287e08 r7:eb009e60 r6:84fbe800 r5:85320c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc0e40 INFO: task kworker/1:287:4555 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b83c9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:4558 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:85324800 r4:85324800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85324800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85324800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ab38c r4:853ab000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ab38c r4:84fc7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85324800 r8:84fc7e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7e00 r8:80287e08 r7:eab55e60 r6:84fbe880 r5:85324800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4540 INFO: task kworker/0:427:4558 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b852f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:4559 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb071d84 r8:00000002 r7:60000013 r6:eb071d8c r5:85323c00 r4:85323c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85323c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85323c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab45000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b038c r4:853b0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b038c r4:84fc7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85323c00 r8:84fc7eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7e80 r8:80287e08 r7:eb06de60 r6:84fbe900 r5:85323c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe46c0 INFO: task kworker/0:428:4559 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b856f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:4561 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:4561 tgid:4561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:85323000 r4:85323000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85323000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85323000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ab78c r4:853ab400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ab78c r4:84fc7f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85323000 r8:84fc7f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7f00 r8:80287e08 r7:eb071e60 r6:84fbe980 r5:85323000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe47c0 INFO: task kworker/0:429:4561 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b8802000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4562 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:85326000 r4:85326000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85326000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85326000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa99000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853abf8c r4:853abc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853abf8c r4:84fc7f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85326000 r8:84fc7fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc7f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc7f80 r8:80287e08 r7:eb071e60 r6:84fbea00 r5:85326000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4680 INFO: task kworker/0:430:4562 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b8bf9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4565 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:85326c00 r4:85326c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85326c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85326c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0719000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853abb8c r4:853ab800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853abb8c r4:84fbea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85326c00 r8:84fbeaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbea80 r8:80287e08 r7:eb009e60 r6:84fbeb00 r5:85326c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ac080 INFO: task kworker/1:288:4565 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b8cb0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:4567 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:85325400 r4:85325400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85325400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85325400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88e9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533c78c r4:8533c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533c78c r4:84fbeb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85325400 r8:84fbebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbeb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbeb80 r8:80287e08 r7:eb009e60 r6:84fbec00 r5:85325400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ac080 INFO: task kworker/1:289:4567 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b8f0a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:4569 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:4569 tgid:4569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:85322400 r4:85322400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85322400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85322400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533cb8c r4:8533c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533cb8c r4:84fbec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85322400 r8:84fbecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbec80 r8:80287e08 r7:eb009e60 r6:84fbed00 r5:85322400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ac280 INFO: task kworker/1:290:4569 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b948d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4570 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:85321800 r4:85321800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85321800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533cf8c r4:8533cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533cf8c r4:84fbed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85321800 r8:84fbedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbed80 r8:80287e08 r7:eb009e60 r6:84fbee00 r5:85321800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb085fb0 to 0xeb085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ac440 INFO: task kworker/1:291:4570 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b948d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:4573 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb089d84 r8:00000002 r7:60000013 r6:eb089d8c r5:853d8000 r4:853d8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850accc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533d78c r4:8533d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533d78c r4:84fbee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d8000 r8:84fbeeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbee80 r8:80287e08 r7:eb009e60 r6:84fbef00 r5:853d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ac580 INFO: task kworker/1:292:4573 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b953f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4575 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb091d84 r8:00000002 r7:60000113 r6:eb091d8c r5:853d8c00 r4:853d8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b0f8c r4:853b0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b0f8c r4:850a3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d8c00 r8:850a302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3000 r8:80287e08 r7:eb071e60 r6:84fbef80 r5:853d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4cc0 INFO: task kworker/0:431:4575 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b98d4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4577 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb095d84 r8:00000002 r7:60000013 r6:eb095d8c r5:853d9800 r4:853d9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b078c r4:853b0400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b078c r4:850a3080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d9800 r8:850a30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3080 r8:80287e08 r7:eb091e60 r6:850a0000 r5:853d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4fc0 INFO: task kworker/0:432:4577 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b9c1b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4580 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb08dd84 r8:00000002 r7:60000113 r6:eb08dd8c r5:8537b000 r4:8537b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc0d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537b000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b0b8c r4:853b0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b0b8c r4:850a3100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537b000 r8:850a312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3100 r8:80287e08 r7:eb091e60 r6:850a3180 r5:8537b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85098080 INFO: task kworker/0:433:4580 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b9c1b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:4585 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:8537bc00 r4:8537bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850acdc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8537bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533db8c r4:8533d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533db8c r4:850a0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537bc00 r8:850a00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0080 r8:80287e08 r7:eb009e60 r6:850a3200 r5:8537bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850acb40 INFO: task kworker/1:293:4585 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b9e4e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:4586 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb09dd84 r8:00000002 r7:60000013 r6:eb09dd8c r5:8537c800 r4:8537c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850acf80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8537c800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533df8c r4:8533dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533df8c r4:850a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537c800 r8:850a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0100 r8:80287e08 r7:eb009e60 r6:850a0180 r5:8537c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850acb00 INFO: task kworker/1:294:4586 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: b9e4e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:4589 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a5d84 r8:00000002 r7:60000013 r6:eb0a5d8c r5:853dc800 r4:853dc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850984c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05dd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b178c r4:853b1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b178c r4:850a0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dc800 r8:850a022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0200 r8:80287e08 r7:eb009e60 r6:850a0280 r5:853dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ace00 INFO: task kworker/1:295:4589 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ba498000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4590 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b1d84 r8:00000002 r7:60000113 r6:eb0b1d8c r5:853da400 r4:853da400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853da400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853da400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0557000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b138c r4:853b1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b138c r4:850a3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853da400 r8:850a32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3280 r8:80287e08 r7:eb091e60 r6:850a0300 r5:853da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85098400 INFO: task kworker/0:434:4590 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ba498000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:4591 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:853dd400 r4:853dd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac05000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b1b8c r4:853b1800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1b8c r4:850a3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dd400 r8:850a332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3300 r8:80287e08 r7:eb0b1e60 r6:850a0380 r5:853dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85098400 INFO: task kworker/0:435:4591 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ba721000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4593 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000113 r6:eb0b9d8c r5:853dbc00 r4:853dbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533e78c r4:8533e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533e78c r4:850a3380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dbc00 r8:850a33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3380 r8:80287e08 r7:eb0a1e60 r6:850a0400 r5:853dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85098400 INFO: task kworker/0:436:4593 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ba721000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:4595 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0bdd84 r8:00000002 r7:60000113 r6:eb0bdd8c r5:853dec00 r4:853dec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cb40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88bb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533f38c r4:8533f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533f38c r4:850a0480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dec00 r8:850a04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0480 r8:80287e08 r7:eb009e60 r6:850a0500 r5:853dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509c280 INFO: task kworker/1:296:4595 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: babf1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:4596 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c1d84 r8:00000002 r7:60000013 r6:eb0c1d8c r5:853de000 r4:853de000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853de000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853de000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533eb8c r4:8533e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533eb8c r4:850a0580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853de000 r8:850a05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0580 r8:80287e08 r7:eb0bde60 r6:850a0600 r5:853de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509c280 INFO: task kworker/1:297:4596 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: babf1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:4599 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c5d84 r8:00000002 r7:60000013 r6:eb0c5d8c r5:853e0c00 r4:853e0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ca00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e888b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533ef8c r4:8533ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ef8c r4:850a0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0c00 r8:850a06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0680 r8:80287e08 r7:eb0bde60 r6:850a0700 r5:853e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509c780 INFO: task kworker/1:298:4599 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: baf48000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:4603 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b5d84 r8:00000002 r7:60000013 r6:eb0b5d8c r5:853e1800 r4:853e1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea911000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533f78c r4:8533f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533f78c r4:850a0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e1800 r8:850a07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0780 r8:80287e08 r7:eb0bde60 r6:850a0800 r5:853e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509c9c0 INFO: task kworker/1:299:4603 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: baf48000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:4605 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:853e2400 r4:853e2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ce00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533fb8c r4:8533f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533fb8c r4:850a0880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e2400 r8:850a08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0880 r8:80287e08 r7:eb0b5e60 r6:850a0900 r5:853e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509cb00 INFO: task kworker/1:300:4605 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bb13f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4606 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb019d84 r8:00000002 r7:60000013 r6:eb019d8c r5:853e3000 r4:853e3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850acb00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847c7b8c r4:847c7800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847c7b8c r4:850a0980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3000 r8:850a09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0980 r8:80287e08 r7:eb0cde60 r6:850a0a00 r5:853e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509cb00 INFO: task kworker/1:301:4606 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bb81b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:4608 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:853e3c00 r4:853e3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cfc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa53000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533ff8c r4:8533fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ff8c r4:850a0a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:850a0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0a80 r8:80287e08 r7:eb019e60 r6:850a0b00 r5:853e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850acd00 INFO: task kworker/1:302:4608 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bb81b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4610 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:853e5400 r4:853e5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534d38c r4:8534d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534d38c r4:850a0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:850a0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0b80 r8:80287e08 r7:eb019e60 r6:850a0c00 r5:853e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509cf80 INFO: task kworker/1:303:4610 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bb81b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:4611 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0ddd84 r8:00000002 r7:60000113 r6:eb0ddd8c r5:853e6000 r4:853e6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534c38c r4:8534c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534c38c r4:850a0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6000 r8:850a0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0c80 r8:80287e08 r7:eb0d9e60 r6:850a0d00 r5:853e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe2080 INFO: task kworker/1:304:4611 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bb932000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:4614 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d5d84 r8:00000002 r7:60000113 r6:eb0d5d8c r5:853e6c00 r4:853e6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe4940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b238c r4:853b2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b238c r4:850a3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6c00 r8:850a342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3400 r8:80287e08 r7:eb0a1e60 r6:850a0d80 r5:853e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850988c0 INFO: task kworker/0:437:4614 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bba8b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:305:4615 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:305 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:853e4800 r4:853e4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe24c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534c78c r4:8534c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534c78c r4:850a0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e4800 r8:850a0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0e00 r8:80287e08 r7:eb0d9e60 r6:850a3480 r5:853e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe2400 INFO: task kworker/1:305:4615 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bbeac000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4617 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:8537d400 r4:8537d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2fc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b1f8c r4:853b1c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1f8c r4:850a3500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537d400 r8:850a352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3500 r8:80287e08 r7:eb0d5e60 r6:850a3580 r5:8537d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85098c00 INFO: task kworker/0:438:4617 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bc104000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:4618 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:8537ec00 r4:8537ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8537ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac55000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534cb8c r4:8534c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534cb8c r4:850a0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537ec00 r8:850a0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0e80 r8:80287e08 r7:eb0d9e60 r6:850a3600 r5:8537ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe25c0 INFO: task kworker/1:306:4618 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bc253000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:4621 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:847c8000 r4:847c8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847c8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe27c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534cf8c r4:8534cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534cf8c r4:850a0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c8000 r8:850a0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0f00 r8:80287e08 r7:eb0d9e60 r6:850a3680 r5:847c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe2700 INFO: task kworker/1:307:4621 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bc42b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4622 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb101d84 r8:00000002 r7:60000013 r6:eb101d8c r5:847c8c00 r4:847c8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847c8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534e38c r4:8534e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534e38c r4:850a0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c8c00 r8:850a0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0f80 r8:80287e08 r7:eb0d9e60 r6:850a3700 r5:847c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe2700 INFO: task kworker/1:308:4622 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bc697000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:4624 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:847ca400 r4:847ca400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847ca400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaced000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534d78c r4:8534d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534d78c r4:84fd7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847ca400 r8:84fd702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7000 r8:80287e08 r7:eb101e60 r6:850a3780 r5:847ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe2740 INFO: task kworker/1:309:4624 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bc93a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:4626 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb111d84 r8:00000002 r7:60000113 r6:eb111d8c r5:847c9800 r4:847c9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847c9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead25000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534db8c r4:8534d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534db8c r4:84fd7080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c9800 r8:84fd70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7080 r8:80287e08 r7:eb101e60 r6:850a3800 r5:847c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe28c0 INFO: task kworker/1:310:4626 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bcba6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:4628 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:847cb000 r4:847cb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847cb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2d00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534df8c r4:8534dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534df8c r4:84fd7100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847cb000 r8:84fd712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7100 r8:80287e08 r7:eb101e60 r6:850a3880 r5:847cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe2a80 INFO: task kworker/1:311:4628 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bccf9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:4632 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb115d84 r8:00000002 r7:60000013 r6:eb115d8c r5:853e0000 r4:853e0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fe2f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534e78c r4:8534e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534e78c r4:84fd7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0000 r8:84fd71ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7180 r8:80287e08 r7:eb101e60 r6:84fd7200 r5:853e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509cf80 INFO: task kworker/1:312:4632 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bcf53000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:4634 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000013 r6:eb11dd8c r5:853e8000 r4:853e8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead73000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534eb8c r4:8534e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534eb8c r4:84fd7280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8000 r8:84fd72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7280 r8:80287e08 r7:eb115e60 r6:84fd7300 r5:853e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcd0c0 INFO: task kworker/1:313:4634 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bcfbb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:4635 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:853e8c00 r4:853e8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcd680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae13000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534f38c r4:8534f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534f38c r4:84fd7380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8c00 r8:84fd73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7380 r8:80287e08 r7:eb11de60 r6:84fd7400 r5:853e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcd0c0 INFO: task kworker/1:314:4635 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bd1f0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:4636 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:4636 tgid:4636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb125d84 r8:00000002 r7:60000013 r6:eb125d8c r5:853e9800 r4:853e9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcd580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534ef8c r4:8534ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534ef8c r4:84fd7480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e9800 r8:84fd74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7480 r8:80287e08 r7:eb121e60 r6:84fd7500 r5:853e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcd0c0 INFO: task kworker/1:315:4636 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bd59c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:4640 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:853ebc00 r4:853ebc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ebc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcd880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae25000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534f78c r4:8534f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534f78c r4:84fd7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ebc00 r8:84fd75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7580 r8:80287e08 r7:eb121e60 r6:84fd7600 r5:853ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcd480 INFO: task kworker/1:316:4640 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bd791000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:4641 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb129d84 r8:00000002 r7:60000013 r6:eb129d8c r5:853eb000 r4:853eb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcdb80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534fb8c r4:8534f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534fb8c r4:84fd7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eb000 r8:84fd76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7680 r8:80287e08 r7:eb12de60 r6:84fd7700 r5:853eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcd5c0 INFO: task kworker/1:317:4641 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bd8d8000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:4644 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb139d84 r8:00000002 r7:60000013 r6:eb139d8c r5:853ec800 r4:853ec800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ec800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da5cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847c7f8c r4:847c7c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847c7f8c r4:850a3900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ec800 r8:850a392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3900 r8:80287e08 r7:eb0d5e60 r6:84fd7780 r5:853ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4c40 INFO: task kworker/0:439:4644 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bdd8b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4646 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:4646 tgid:4646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb13dd84 r8:00000002 r7:60000013 r6:eb13dd8c r5:853ee000 r4:853ee000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ee000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcde00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534ff8c r4:8534fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534ff8c r4:84fd7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ee000 r8:84fd782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7800 r8:80287e08 r7:eb129e60 r6:84fd7880 r5:853ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcda00 INFO: task kworker/1:318:4646 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bdfad000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:4648 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb141d84 r8:00000002 r7:60000113 r6:eb141d8c r5:853eec00 r4:853eec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcc2c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf25000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535478c r4:85354400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535478c r4:84fd7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eec00 r8:84fd792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7900 r8:80287e08 r7:eb13de60 r6:84fd7980 r5:853eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcdc80 INFO: task kworker/1:319:4648 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: be1f7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:4649 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:853ea400 r4:853ea400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ea400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb0040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b278c r4:853b2400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b278c r4:850a3980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ea400 r8:850a39ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3980 r8:80287e08 r7:eb139e60 r6:84fd7a00 r5:853ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fe4c40 INFO: task kworker/0:440:4649 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: be1f7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4650 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb14dd84 r8:00000002 r7:60000113 r6:eb14dd8c r5:853ed400 r4:853ed400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ed400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb02c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2b8c r4:853b2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2b8c r4:850a3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ed400 r8:850a3a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3a00 r8:80287e08 r7:eb139e60 r6:84fd7a80 r5:853ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb0080 INFO: task kworker/0:441:4650 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: be78a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:4652 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:853f0000 r4:853f0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcc180 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535438c r4:85354000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535438c r4:84fd7b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0000 r8:84fd7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7b00 r8:80287e08 r7:eb141e60 r6:84fd7b80 r5:853f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcd080 INFO: task kworker/1:320:4652 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: be78a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:4656 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853f0c00 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b378c r4:853b3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b378c r4:850a3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0c00 r8:850a3aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a3a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a3a80 r8:80287e08 r7:eb139e60 r6:84fd7c00 r5:853f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fb0200 INFO: task kworker/0:442:4656 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: be78a000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4657 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:853f1800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85354b8c r4:85354800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853f1800 r8:84fd7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:853f2400 r4:853f2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcc5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf59000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85354f8c r4:85354c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85354f8c r4:84fd7d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f2400 r8:84fd7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7d80 r8:80287e08 r7:eb149e60 r6:84fd7e00 r5:853f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcc240 INFO: task kworker/1:322:4659 is blocked on a mutex likely owned by task kworker/1:93:3664. r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 task:kworker/1:323 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:853f3000 r4:853f3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcc740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535538c r4:85355000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535538c r4:84fd7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3000 r8:84fd7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fd7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fd7e80 r8:80287e08 r7:eb131e60 r6:84fd7f00 r5:853f3000 r4:84fcc3c0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85355b8c r4:85355800 r10:61c88647 r9:853f3c00 r8:84fd7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:4665 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:853f4800 r4:853f4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcc8c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf91000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535578c r4:85355400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535578c r4:84fc2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f4800 r8:84fc20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2080 r8:80287e08 r7:eb159e60 r6:84fc2100 r5:853f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc4380 task:kworker/1:326 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85355f8c r4:85355c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85355f8c r4:84fc2180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6000 r8:84fc21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2180 r8:80287e08 r7:eb159e60 r6:84fc2200 r5:853f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fcc880 INFO: task kworker/1:326:4668 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bf7d3000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853f6c00 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fcce40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535638c r4:85356000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535638c r4:84fc2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6c00 r8:84fc22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:328:4671 blocked for more than 462 seconds. r4:853f8c00 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8535678c r4:84fc2380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:4673 tgid:4673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:853fa400 r4:853fa400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fa400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6b540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85356f8c r4:85356c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85356f8c r4:84fc2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fa400 r8:84fc24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2480 r8:80287e08 r7:eb16de60 r6:84fc2500 r5:853fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f6b100 INFO: task kworker/1:329:4673 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: bfe4f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:330:4675 blocked for more than 462 seconds. r4:847cec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r5:00001000 r4:dfc61000 r5:85356b8c r4:85356800 r7:ddde2d80 r6:83018200 r5:85356b8c r4:84fc2580 r4:00000001 r4:84f6b280 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8535738c r4:85357000 r7:ddde2d80 r6:83018200 r5:8535738c r4:84fc2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847ce000 r8:84fc262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2600 r8:80287e08 r7:eb171e60 r6:850a3b80 r5:847ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f6b3c0 INFO: task kworker/1:331:4676 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c03dc000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:4679 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:847cc800 r4:847cc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847cc800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85357b8c r4:85357800 r7:ddde2d80 r6:83018200 r5:85357b8c r4:84fc2680 Exception stack(0xeb165fb0 to 0xeb165ff8) Workqueue: events bpf_prog_free_deferred 9d20: c07de000 e004b000 00000001 80239b98 7f14b000 00000001 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:853db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8535778c r4:85357400 r10:61c88647 r9:853db000 r8:84fc272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f6b6c0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:4685 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:84d98000 r4:84d98000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d98000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6bac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d98000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea935000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85357f8c r4:85357c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85357f8c r4:84fc2780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d98000 r8:84fc27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2780 r8:80287e08 r7:eb165e60 r6:850a3d00 r5:84d98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f6b800 INFO: task kworker/1:334:4685 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c10da000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 r4:84d98c00 r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6bc40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d438c r4:853d4000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d438c r4:84fc2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d98c00 r8:84fc282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2800 r8:80287e08 r7:eb195e60 r6:850a3d80 r5:84d98c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f6b940 INFO: task kworker/1:335:4686 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c10da000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e00c9dc0 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 task:kworker/1:336 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6bd40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d478c r4:853d4400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d478c r4:84fc2880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d9b000 r8:84fc28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2880 r8:80287e08 r7:eb199e60 r6:850a3e00 r5:84d9b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f6ba40 INFO: task kworker/1:336:4689 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:853d538c r4:853d5000 r10:61c88647 r9:84d9bc00 r8:84fc292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:4691 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:84d99800 r4:84d99800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d99800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6be80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d99800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab51000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d4b8c r4:853d4800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d4b8c r4:84fc2980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d99800 r8:84fc29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2980 r8:80287e08 r7:eb1a9e60 r6:850a3f00 r5:84d99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:84d9a400 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:853d4f8c r4:853d4c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fc2a00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84f6be40 INFO: task kworker/1:339:4693 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c1c87000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84d9c800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853d578c r4:853d5400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d9c800 r8:84fc2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fcca80 INFO: task kworker/1:340:4696 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c204d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:4698 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f42800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d6b8c r4:853d6800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d6b8c r4:84fc2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d9ec00 r8:84fc2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2b00 r8:80287e08 r7:eb1c1e60 r6:84f4d080 r5:84d9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r9:83018205 r8:8537e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d5b8c r4:853d5800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d5b8c r4:84fc2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537e000 r8:84fc2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2b80 r8:80287e08 r7:eb1c9e60 r6:84f4d100 r5:8537e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:84d9d400 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:853d5f8c r4:853d5c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fc2c00 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 r5:00001000 r4:eceef000 r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4703 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:8537a400 r4:8537a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f42580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8537a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb075000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d638c r4:853d6000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d638c r4:84fc2c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537a400 r8:84fc2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2c80 r8:80287e08 r7:eb1c9e60 r6:84f4d200 r5:8537a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f422c0 INFO: task kworker/1:344:4703 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c2a19000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:345:4706 blocked for more than 463 seconds. Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:85381800 r4:85381800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85381800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f426c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85381800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1dd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d678c r4:853d6400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853d678c r4:84fc2d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85381800 r8:84fc2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2d00 r8:80287e08 r7:eb1c9e60 r6:84f4d280 r5:85381800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f42540 INFO: task kworker/1:345:4706 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c2bb0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:346:4707 blocked for more than 463 seconds. r4:85380000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r5:00001000 r4:eb1fd000 r5:853d6f8c r4:853d6c00 r7:ddde2d80 r6:83018200 r5:853d6f8c r4:84fc2d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4709 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:85382400 r4:85382400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85382400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:853d738c r4:853d7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85382400 r8:84fc2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c32ca000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:348:4712 blocked for more than 463 seconds. r4:85383c00 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853d7b8c r4:853d7800 r10:61c88647 r9:85383c00 r8:84fc2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 r4:85383000 r4:00000000 r4:00000000 r5:853d778c r4:853d7400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84fc2f00 9fa0: 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85386000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85386000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f42f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85386000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb245000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541038c r4:85410000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541038c r4:84fc2f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85386000 r8:84fc2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fc2f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fc2f80 r8:80287e08 r7:eb21de60 r6:84f4d500 r5:85386000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f42a80 INFO: task kworker/1:350:4716 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c3b90000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85385400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:853d7f8c r4:853d7c00 r10:61c88647 r9:85385400 r8:84f3302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:e00c9dc0 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc4380 task:kworker/1:352 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85380c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6bec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85380c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85410f8c r4:85410c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85410f8c r4:84f33080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85380c00 r8:84f330ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33080 r8:80287e08 r7:eb23de60 r6:84f4d600 r5:85380c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f42cc0 INFO: task kworker/1:352:4720 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c43d8000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:00001000 r4:eceef000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb251000 r5:8541078c r4:85410400 r7:ddde2d80 r6:83018200 r5:8541078c r4:84f33100 Exception stack(0xeb269fb0 to 0xeb269ff8) Workqueue: events bpf_prog_free_deferred 9d20: c467b000 e004b000 00000001 80239b98 7f14b000 00000001 r4:00000000 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 INFO: task kworker/1:354:4723 blocked for more than 463 seconds. r4:85448000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r5:85410b8c r4:85410800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85410b8c r4:84f33180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85448000 r8:84f331ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33180 r8:80287e08 r7:eb261e60 r6:84f4d700 r5:85448000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f42e00 INFO: task kworker/1:354:4723 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c47a6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4726 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:85449800 r4:85449800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85449800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85411b8c r4:85411800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85411b8c r4:84f33200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85449800 r8:84f3322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33200 r8:80287e08 r7:eb261e60 r6:84f4d780 r5:85449800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f6bfc0 INFO: task kworker/1:355:4726 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c47a6000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4728 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:8544b000 r4:8544b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f300c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541138c r4:85411000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541138c r4:84f33280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544b000 r8:84f332ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33280 r8:80287e08 r7:eb295e60 r6:84f4d800 r5:8544b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30000 INFO: task kworker/1:356:4728 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c4e0e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4729 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4729 tgid:4729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:85448c00 r4:85448c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85448c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541178c r4:85411400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541178c r4:84f33300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85448c00 r8:84f3332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33300 r8:80287e08 r7:eb295e60 r6:84f4d880 r5:85448c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30000 INFO: task kworker/1:357:4729 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c4f31000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4732 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2bdd84 r8:00000002 r7:60000113 r6:eb2bdd8c r5:8544d400 r4:8544d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85411f8c r4:85411c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85411f8c r4:84f33380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544d400 r8:84f333ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33380 r8:80287e08 r7:eb295e60 r6:84f4d900 r5:8544d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f301c0 INFO: task kworker/1:358:4732 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c4f31000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:4735 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:8544ec00 r4:8544ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541238c r4:85412000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541238c r4:84f33400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544ec00 r8:84f3342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33400 r8:80287e08 r7:eb2bde60 r6:84f4d980 r5:8544ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f302c0 INFO: task kworker/1:359:4735 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c5384000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4736 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:8544c800 r4:8544c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f307c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541278c r4:85412400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541278c r4:84f33480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544c800 r8:84f334ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33480 r8:80287e08 r7:eb2d9e60 r6:84f4da00 r5:8544c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30500 INFO: task kworker/1:360:4736 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c5748000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:4737 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:8544bc00 r4:8544bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb311000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541338c r4:85413000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541338c r4:84f33500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544bc00 r8:84f3352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33500 r8:80287e08 r7:eb2dde60 r6:84f4da80 r5:8544bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30780 INFO: task kworker/1:361:4737 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c5748000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:4739 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb305d84 r8:00000002 r7:60000013 r6:eb305d8c r5:85386c00 r4:85386c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85386c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85386c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85412b8c r4:85412800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85412b8c r4:84f33580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85386c00 r8:84f335ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33580 r8:80287e08 r7:eb2e9e60 r6:84f4db00 r5:85386c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30840 INFO: task kworker/1:362:4739 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c5c57000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4741 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:8544a400 r4:8544a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb301000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85412f8c r4:85412c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85412f8c r4:84f33600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544a400 r8:84f3362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33600 r8:80287e08 r7:eb2e9e60 r6:84f4db80 r5:8544a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30700 INFO: task kworker/1:363:4741 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c5c57000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4743 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:84e50c00 r4:84e50c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e50c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30d00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb321000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541378c r4:85413400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541378c r4:84f33680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e50c00 r8:84f336ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33680 r8:80287e08 r7:eb2e9e60 r6:84f4dc00 r5:84e50c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30b80 INFO: task kworker/1:364:4743 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c608e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4745 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:84e52400 r4:84e52400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e52400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f49b80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e52400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb369000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541438c r4:85414000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541438c r4:84f33700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e52400 r8:84f3372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33700 r8:80287e08 r7:eb325e60 r6:84f4dc80 r5:84e52400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f309c0 INFO: task kworker/1:365:4745 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c6585000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4747 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb35dd84 r8:00000002 r7:60000113 r6:eb35dd8c r5:84e51800 r4:84e51800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e51800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e51800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb335000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85413b8c r4:85413800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85413b8c r4:84f33780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e51800 r8:84f337ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33780 r8:80287e08 r7:eb32de60 r6:84f4dd00 r5:84e51800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30a00 INFO: task kworker/1:366:4747 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c6585000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4749 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4749 tgid:4749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb36dd84 r8:00000002 r7:60000113 r6:eb36dd8c r5:84e53000 r4:84e53000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e53000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e53000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb359000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85413f8c r4:85413c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85413f8c r4:84f33800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e53000 r8:84f3382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33800 r8:80287e08 r7:eb32de60 r6:84f4dd80 r5:84e53000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30ec0 INFO: task kworker/1:367:4749 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c69f4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4751 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:84e53c00 r4:84e53c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e53c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0701000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541638c r4:85416000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541638c r4:84f33880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e53c00 r8:84f338ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33880 r8:80287e08 r7:eb32de60 r6:84f4de00 r5:84e53c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f49c00 INFO: task kworker/1:368:4751 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c6d76000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4753 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb38dd84 r8:00000002 r7:60000013 r6:eb38dd8c r5:84e54800 r4:84e54800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e54800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f30f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e54800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541478c r4:85414400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541478c r4:84f33900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e54800 r8:84f3392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33900 r8:80287e08 r7:eb37de60 r6:84f4de80 r5:84e54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb38dfb0 to 0xeb38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f30f80 INFO: task kworker/1:369:4753 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c6d76000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:4755 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb39dd84 r8:00000002 r7:60000013 r6:eb39dd8c r5:84e55400 r4:84e55400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e55400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fccfc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e55400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb389000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85414b8c r4:85414800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85414b8c r4:84f33980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e55400 r8:84f339ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33980 r8:80287e08 r7:eb37de60 r6:84f4df00 r5:84e55400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f49200 INFO: task kworker/1:370:4755 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c6f7f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4758 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:84e56c00 r4:84e56c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e56c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e56c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb399000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85414f8c r4:85414c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85414f8c r4:84f33a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e56c00 r8:84f33a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33a00 r8:80287e08 r7:eb37de60 r6:84f4df80 r5:84e56c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e7080 INFO: task kworker/1:371:4758 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c72f5000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4759 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:84e56000 r4:84e56000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e56000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e72c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e56000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541538c r4:85415000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541538c r4:84f33b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e56000 r8:84f33b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33b00 r8:80287e08 r7:eb37de60 r6:84d57000 r5:84e56000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b5fb0 to 0xeb3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e7340 INFO: task kworker/1:372:4759 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c77a2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4761 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b9d84 r8:00000002 r7:60000013 r6:eb3b9d8c r5:8544e000 r4:8544e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541578c r4:85415400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541578c r4:84f33a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544e000 r8:84f33aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33a80 r8:80287e08 r7:eb37de60 r6:84d57080 r5:8544e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e7380 INFO: task kworker/1:373:4761 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c77a2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:4763 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:85450c00 r4:85450c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85450c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85450c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85415b8c r4:85415800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85415b8c r4:84f33b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85450c00 r8:84f33bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33b80 r8:80287e08 r7:eb37de60 r6:84d57100 r5:85450c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e7340 INFO: task kworker/1:374:4763 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c7d40000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4766 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb26dd84 r8:00000002 r7:60000113 r6:eb26dd8c r5:85451800 r4:85451800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85451800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84713f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85451800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b3b8c r4:853b3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3b8c r4:84d57180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85451800 r8:84d571ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57180 r8:80287e08 r7:eb139e60 r6:84d57200 r5:85451800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847134c0 INFO: task kworker/0:443:4766 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c7d40000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4768 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:853fd400 r4:853fd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85415f8c r4:85415c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85415f8c r4:84f33c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fd400 r8:84f33c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33c00 r8:80287e08 r7:eb37de60 r6:84f33c80 r5:853fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e73c0 INFO: task kworker/1:375:4768 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c801e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4771 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:853fe000 r4:853fe000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fe000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85416f8c r4:85416c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85416f8c r4:84f33d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fe000 r8:84f33d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33d00 r8:80287e08 r7:eb37de60 r6:84f33d80 r5:853fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e75c0 INFO: task kworker/1:376:4771 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c801e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4772 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4772 tgid:4772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:853fec00 r4:853fec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85416b8c r4:85416800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85416b8c r4:84f33e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fec00 r8:84f33e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33e00 r8:80287e08 r7:eb3c5e60 r6:84f33e80 r5:853fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e75c0 INFO: task kworker/1:377:4772 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c801e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4774 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:853fbc00 r4:853fbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e888d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541678c r4:85416400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8541678c r4:84d57280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fbc00 r8:84d572ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57280 r8:80287e08 r7:eb139e60 r6:84f33f00 r5:853fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84713000 INFO: task kworker/0:444:4774 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c83a1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:4775 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:85453000 r4:85453000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85453000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da5a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85453000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8404b38c r4:8404b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8404b38c r4:84d57300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85453000 r8:84d5732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57300 r8:80287e08 r7:eb139e60 r6:84d57380 r5:85453000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84713000 INFO: task kworker/0:445:4775 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c8821000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:4779 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:85455400 r4:85455400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85455400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e7040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85455400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541738c r4:85417000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541738c r4:84f33f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85455400 r8:84f33fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f33f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f33f80 r8:80287e08 r7:eb3c5e60 r6:84d57400 r5:85455400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845e7ec0 INFO: task kworker/1:378:4779 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c8b76000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:4782 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:4782 tgid:4782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e9d84 r8:00000002 r7:60000113 r6:eb3e9d8c r5:85454800 r4:85454800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85454800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da7040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85454800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabfd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541778c r4:85417400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541778c r4:84d56000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85454800 r8:84d5602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56000 r8:80287e08 r7:eb3dde60 r6:84d57480 r5:85454800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da7000 INFO: task kworker/1:379:4782 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c8b76000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:4783 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:85456c00 r4:85456c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85456c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da7340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85456c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85417b8c r4:85417800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85417b8c r4:84d56080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85456c00 r8:84d560ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56080 r8:80287e08 r7:eb3e9e60 r6:84d57500 r5:85456c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da7000 INFO: task kworker/1:380:4783 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c8d88000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4785 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:85456000 r4:85456000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85456000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da7600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85456000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541838c r4:85418000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541838c r4:84d56100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85456000 r8:84d5612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56100 r8:80287e08 r7:eb3ede60 r6:84d57580 r5:85456000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da71c0 INFO: task kworker/1:381:4785 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c8d88000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84d56180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56180 r8:80287e08 r7:eb3f5e60 r6:84d57600 r5:85450000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da71c0 INFO: task kworker/1:382:4787 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c91d4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4789 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da77c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472b0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf07000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85487f8c r4:85487c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85487f8c r4:84d56300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f9800 r8:84d5632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56300 r8:80287e08 r7:eb3fde60 r6:84d56380 r5:853f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da7640 INFO: task kworker/1:384:4791 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c9905000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:4793 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85453c00 r8:84d5642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85493b8c r4:85493800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85493b8c r4:84d56480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e50000 r8:84d564ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56480 r8:80287e08 r7:eb3f1e60 r6:84d57700 r5:84e50000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da78c0 INFO: task kworker/1:386:4795 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: c9e7f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4799 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4799 tgid:4799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da5b40 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4800 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3cdd84 r8:00000002 r7:60000013 r6:eb3cdd8c r5:85460c00 r4:85460c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85460c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f6b3c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85460c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab15000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85484f8c r4:85484c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85484f8c r4:84d57880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85460c00 r8:84d578ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57880 r8:80287e08 r7:eb139e60 r6:84d57900 r5:85460c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da5ac0 INFO: task kworker/0:447:4800 is blocked on a mutex likely owned by task kworker/1:93:3664. Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:00001000 r4:eceef000 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:4803 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb19dd84 r8:00000002 r7:60000113 r6:eb19dd8c r5:85462400 r4:85462400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85462400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da7cc0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da7b00 INFO: task kworker/1:387:4803 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ca478000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da5380 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da5e80 INFO: task kworker/0:448:4804 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ca572000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4806 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85463c00 r4:85463c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85463c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84713c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85463c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:00001000 r4:ea991000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85484b8c r4:85484800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85484b8c r4:84d57b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85463c00 r8:84d57b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57b00 r8:80287e08 r7:eb3cde60 r6:84d57b80 r5:85463c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84713fc0 INFO: task kworker/0:449:4806 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ca572000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 task:kworker/0:450 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548538c r4:85485000 r10:61c88647 r9:85464800 r8:84d57c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57c00 r8:80287e08 r7:eb3cde60 r6:84d57c80 r5:85464800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da5340 INFO: task kworker/0:450:4809 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: caa46000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548578c r4:85485400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548578c r4:84d57d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85465400 r8:84d57d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57d00 r8:80287e08 r7:eb18de60 r6:84d57d80 r5:85465400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d54080 INFO: task kworker/0:451:4811 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: caa46000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:85466000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548638c r4:85486000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548638c r4:84d57e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85466000 r8:84d57e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57e00 r8:80287e08 r7:eb1e5e60 r6:84d57e80 r5:85466000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d54380 INFO: task kworker/0:452:4813 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cb022000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc4380 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead4d000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85485b8c r4:85485800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85485b8c r4:84d57f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85461800 r8:84d57f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d57f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d57f00 r8:80287e08 r7:eb221e60 r6:84d57f80 r5:85461800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d542c0 INFO: task kworker/0:453:4814 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cb022000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r5:8526a78c r4:8526a400 r4:84fbb200 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:4816 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:847d0000 r4:847d0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847d0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54780 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fbb200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:455 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548678c r4:85486400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548678c r4:8478f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d0c00 r8:8478f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478f100 r8:80287e08 r7:eb221e60 r6:8478f180 r5:847d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d546c0 INFO: task kworker/0:455:4820 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:84fc4380 task:kworker/0:456 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:847d1800 r4:847d1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847d1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85486b8c r4:85486800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85486b8c r4:8478f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d1800 r8:8478f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478f200 r8:80287e08 r7:eb229e60 r6:8478f280 r5:847d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d546c0 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847d2400 r8:8478f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478f300 r8:80287e08 r7:eb289e60 r6:8478f380 r5:847d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d549c0 INFO: task kworker/0:457:4823 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cbc36000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:458:4825 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:847d3000 r4:847d3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847d3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae95000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548738c r4:85487000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548738c r4:8478f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d3000 r8:8478f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478f400 r8:80287e08 r7:eb2ade60 r6:8478f480 r5:847d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r5:8526a78c r4:8526a400 9fa0: 00000000 00000000 00000000 00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84d54d80 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e00c9dc0 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 INFO: task kworker/0:461:4830 blocked for more than 464 seconds. [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85487b8c r4:85487800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85487b8c r4:8478f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d5400 r8:8478f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478f700 r8:80287e08 r7:eb2c9e60 r6:8478f780 r5:847d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d54dc0 INFO: task kworker/0:461:4830 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:84fbb200 r4:84fc4380 r10:8291a684 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:847d6c00 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541938c r4:85419000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8541938c r4:8478f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d6c00 r8:8478f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478f800 r8:80287e08 r7:eb2c9e60 r6:8478f880 r5:847d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472b000 INFO: task kworker/0:462:4832 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cc3f3000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 r5:00001000 r4:eceef000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8291a684 r9:eb319d84 r8:00000002 r7:60000013 r6:eb319d8c r5:85468000 r5:00001000 r4:eb191000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eceef000 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4835 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:85469800 r4:85469800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85469800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85469800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4838 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:8546a400 r4:8546a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549038c r4:85490000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549038c r4:8478fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546a400 r8:8478fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8472b4c0 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8546b000 r8:8478fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472b700 INFO: task kworker/0:464:4839 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ccc11000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 r5:00001000 r4:eceef000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8291a684 r9:eb381d84 r8:00000002 r7:60000113 r6:eb381d8c r5:8546bc00 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85490f8c r4:8478fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546bc00 r8:8478fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478fc00 r8:80287e08 r7:eb2c9e60 r6:8478fc80 r5:8546bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472b900 INFO: task kworker/0:465:4842 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ccde7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eceef000 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e00c9dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472bd00 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r5:00001000 r4:eceef000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8546e000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:85491f8c r4:8478ff80 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:4850 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb429d84 r8:00000002 r7:60000013 r6:eb429d8c r5:8546ec00 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472be80 INFO: task kworker/0:469:4850 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:e00c9dc0 r5:8526a78c r4:8526a400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84cb4180 r8:80287e08 r7:eb429e60 r6:84cb4200 r5:847d6000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cd92e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:8291a684 r9:eb431d84 r8:00000002 r7:60000113 r6:eb431d8c r5:84c68000 r5:00001000 r4:eb0e1000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb431fb0 to 0xeb431ff8) r4:00000000 r4:e00c9dc0 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 INFO: task kworker/0:472:4855 blocked for more than 465 seconds. [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f343c0 INFO: task kworker/0:472:4855 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cdd1b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:e072d000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ce03d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84cb4500 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000001 r4:84fc4380 r4:84c6bc00 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:85418f8c r4:84d56700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ce29e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84c6d400 r8:84cb46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb4680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb4680 r8:80287e08 r7:eb445e60 r6:84cb4700 r5:84c6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f34e40 INFO: task kworker/0:474:4869 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0113 r4:80239bb0 r5:00001000 r4:eceef000 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847165c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85493f8c r4:85493c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85493f8c r4:84cb4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6ec00 r8:84cb482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb4800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb4800 r8:80287e08 r7:eb439e60 r6:84cb4880 r5:84c6ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f34e40 INFO: task kworker/0:475:4872 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ce598000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84c6c800 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f34fc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549838c r4:85498000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549838c r4:84cb4900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6c800 r8:84cb492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb4900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb4900 r8:80287e08 r7:eb44de60 r6:84cb4980 r5:84c6c800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ceb53000 e004b000 00000001 80239b98 7f14b000 00000001 r5:800f0113 r4:80239bb0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84cb4a00 r8:80287e08 r7:eb451e60 r6:84cb4a80 r5:84c69800 9d20: ceb53000 e004b000 00000001 80239b98 7f14b000 00000001 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4875 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:85478000 r4:85478000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85478000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eac040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85478000 r8:84cb4b2c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r4:82ac21e4 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:4877 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:85478c00 r4:85478c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85478c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847161c0 r4:00000000 r5:00001000 r4:e88eb000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb45dfb0 to 0xeb45dff8) r4:84716e80 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4878 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:85479800 r4:85479800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85479800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85479800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ab8c r4:8541a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ab8c r4:84d56880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85479800 r8:84d568ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56880 r8:80287e08 r7:eb45de60 r6:84cb4c80 r5:85479800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847166c0 INFO: task kworker/1:394:4878 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cef6d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:8547a400 r4:8547a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8547a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541af8c r4:8541ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541af8c r4:84d56900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547a400 r8:84d5692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56900 r8:80287e08 r7:eb461e60 r6:84cb4d00 r5:8547a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb465fb0 to 0xeb465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84716380 INFO: task kworker/1:395:4881 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:396:4883 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb469d84 r8:00000002 r7:60000013 r6:eb469d8c r5:8547b000 r4:8547b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8547b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac15000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541b38c r4:8541b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541b38c r4:84d56980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547b000 r8:84d569ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56980 r8:80287e08 r7:eb465e60 r6:84cb4d80 r5:8547b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f52080 INFO: task kworker/1:396:4883 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 r5:00001000 r4:eceef000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000013 r6:eb46dd8c r5:8547bc00 r4:8547bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f523c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8547bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541b78c r4:8541b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541b78c r4:84d56a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547bc00 r8:84d56a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56a00 r8:80287e08 r7:eb469e60 r6:84cb4e00 r5:8547bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f52140 INFO: task kworker/1:397:4885 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r5:8526a78c r4:8526a400 r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4887 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:8547c800 r4:8547c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8547c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cb8c r4:8541c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8541cb8c r4:84cb4e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547c800 r8:84cb4eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb4e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb4e80 r8:80287e08 r7:eb459e60 r6:84cb4f00 r5:8547c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f4f5c0 INFO: task kworker/0:479:4887 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4889 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:8547d400 r4:8547d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8547d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541bb8c r4:8541b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541bb8c r4:84d56a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547d400 r8:84d56aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56a80 r8:80287e08 r7:eb46de60 r6:84cb4f80 r5:8547d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84f52240 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4891 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:853fc800 r4:853fc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541bf8c r4:8541bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541bf8c r4:84d56b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fc800 r8:84d56b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56b00 r8:80287e08 r7:eb471e60 r6:84d56b80 r5:853fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb475fb0 to 0xeb475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4893 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:853fb000 r4:853fb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c38c r4:8541c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c38c r4:84d56c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fb000 r8:84d56c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56c00 r8:80287e08 r7:eb475e60 r6:84d56c80 r5:853fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f52600 INFO: task kworker/1:400:4893 is blocked on a mutex likely owned by task kworker/1:93:3664. r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4895 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb479d84 r8:00000002 r7:60000113 r6:eb479d8c r5:853f8000 r4:853f8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541d78c r4:8541d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d78c r4:84d56d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f8000 r8:84d56d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56d00 r8:80287e08 r7:eb435e60 r6:84d56d80 r5:853f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f52640 INFO: task kworker/1:401:4895 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: cfdbb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:85468c00 r4:85468c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85468c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f529c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: d040f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4899 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85498b8c r4:85498800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85498b8c r4:84745000 r10:61c88647 r9:8547e000 r8:8474502c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84745000 r8:80287e08 r7:eb459e60 r6:84745080 r5:8547e000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84f4f9c0 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:82ac21e4 r4:e00c9dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4900 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb489d84 r8:00000002 r7:60000113 r6:eb489d8c r5:84d9e000 r4:84d9e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d9e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb219000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cf8c r4:8541cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cf8c r4:84d56f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d9e000 r8:84d56f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d56f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d56f00 r8:80287e08 r7:eb479e60 r6:84d56f80 r5:84d9e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f52b00 INFO: task kworker/1:403:4900 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d096c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4902 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:847cbc00 r4:847cbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847cbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb241000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541d38c r4:8541d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d38c r4:84f4a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847cbc00 r8:84f4a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a000 r8:80287e08 r7:eb479e60 r6:84f4a080 r5:847cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f52b00 INFO: task kworker/1:404:4902 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d0c49000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4905 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb481d84 r8:00000002 r7:60000113 r6:eb481d8c r5:847cd400 r4:847cd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847cd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f4ff00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85498f8c r4:85498c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85498f8c r4:84745100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847cd400 r8:8474512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745100 r8:80287e08 r7:eb459e60 r6:84f4a100 r5:847cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb481fb0 to 0xeb481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f4fd80 INFO: task kworker/0:481:4905 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d0e7d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4907 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb491d84 r8:00000002 r7:60000013 r6:eb491d8c r5:853f5400 r4:853f5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f34e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb275000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541db8c r4:8541d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541db8c r4:84f4a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f5400 r8:84f4a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a180 r8:80287e08 r7:eb479e60 r6:84f4a200 r5:853f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847160c0 INFO: task kworker/1:405:4907 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d0e7d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4910 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:85400000 r4:85400000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85400000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e38c r4:8541e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e38c r4:84f4a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85400000 r8:84f4a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a280 r8:80287e08 r7:eb491e60 r6:84f4a300 r5:85400000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739000 INFO: task kworker/1:406:4910 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d15c2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4911 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb499d84 r8:00000002 r7:60000113 r6:eb499d8c r5:85400c00 r4:85400c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85400c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847390c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85400c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541df8c r4:8541dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541df8c r4:84f4a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85400c00 r8:84f4a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a380 r8:80287e08 r7:eb495e60 r6:84f4a400 r5:85400c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739140 INFO: task kworker/1:407:4911 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d17c0000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4913 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:85401800 r4:85401800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85401800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847394c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85401800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e78c r4:8541e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e78c r4:84f4a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85401800 r8:84f4a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a480 r8:80287e08 r7:eb495e60 r6:84f4a500 r5:85401800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739200 INFO: task kworker/1:408:4913 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d1d7e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4914 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a5d84 r8:00000002 r7:60000013 r6:eb4a5d8c r5:85403000 r4:85403000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85403000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85403000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541eb8c r4:8541e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541eb8c r4:84f4a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85403000 r8:84f4a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a580 r8:80287e08 r7:eb49de60 r6:84f4a600 r5:85403000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739200 INFO: task kworker/1:409:4914 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d244b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4916 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:85402400 r4:85402400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85402400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541f78c r4:8541f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f78c r4:84f4a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85402400 r8:84f4a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a680 r8:80287e08 r7:eb4a5e60 r6:84f4a700 r5:85402400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739340 INFO: task kworker/1:410:4916 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d244b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:4918 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:85404800 r4:85404800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85404800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ef8c r4:8541ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ef8c r4:84f4a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85404800 r8:84f4a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a780 r8:80287e08 r7:eb4a9e60 r6:84f4a800 r5:85404800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739340 INFO: task kworker/1:411:4918 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d2757000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4921 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a1d84 r8:00000002 r7:60000113 r6:eb4a1d8c r5:85405400 r4:85405400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85405400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847015c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85405400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549978c r4:85499400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549978c r4:84745180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85405400 r8:847451ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745180 r8:80287e08 r7:eb459e60 r6:84f4a880 r5:85405400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:846f5000 INFO: task kworker/0:482:4921 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d2ab2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4923 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000013 r6:eb4b5d8c r5:85406c00 r4:85406c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85406c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541f38c r4:8541f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f38c r4:84f4a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406c00 r8:84f4a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4a900 r8:80287e08 r7:eb4a9e60 r6:84f4a980 r5:85406c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739a00 INFO: task kworker/1:412:4923 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d2f4e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:4925 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:854ca400 r4:854ca400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854ca400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb337000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ff8c r4:8541fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ff8c r4:84f4aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ca400 r8:84f4aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4aa00 r8:80287e08 r7:eb4a9e60 r6:84745200 r5:854ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739c80 INFO: task kworker/1:413:4925 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d2f4e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4927 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:85406000 r4:85406000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85406000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84739f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb329000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541fb8c r4:8541f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541fb8c r4:84f4aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406000 r8:84f4aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4aa80 r8:80287e08 r7:eb4bde60 r6:84f4ab00 r5:85406000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739d00 INFO: task kworker/1:414:4927 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d313f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4929 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c9d84 r8:00000002 r7:60000013 r6:eb4c9d8c r5:854cb000 r4:854cb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f4f840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542838c r4:85428000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542838c r4:84f4ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cb000 r8:84f4abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ab80 r8:80287e08 r7:eb4bde60 r6:84745280 r5:854cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739d00 INFO: task kworker/1:415:4929 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d38f1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4931 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:854c8000 r4:854c8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542878c r4:85428400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542878c r4:84f4ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8000 r8:84f4ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ac00 r8:80287e08 r7:eb4c9e60 r6:84745300 r5:854c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84739fc0 INFO: task kworker/1:416:4931 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d3c5c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4933 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:854cc800 r4:854cc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542978c r4:85429400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542978c r4:84f4ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cc800 r8:84f4acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ac80 r8:80287e08 r7:eb4cde60 r6:84745380 r5:854cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf85fb0 to 0xeaf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e100 INFO: task kworker/1:417:4933 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d3c5c000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:4935 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:854ce000 r4:854ce000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854ce000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85428b8c r4:85428800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85428b8c r4:84f4ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ce000 r8:84f4ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ad00 r8:80287e08 r7:eaf85e60 r6:84745400 r5:854ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e1c0 INFO: task kworker/1:418:4935 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d40d8000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4936 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d9d84 r8:00000002 r7:60000013 r6:eb4d9d8c r5:854cec00 r4:854cec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e4c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85428f8c r4:85428c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85428f8c r4:84f4ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cec00 r8:84f4adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ad80 r8:80287e08 r7:eaf85e60 r6:84745480 r5:854cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e1c0 INFO: task kworker/1:419:4936 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d41d7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4938 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4938 tgid:4938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e1d84 r8:00000002 r7:60000113 r6:eb4e1d8c r5:854cd400 r4:854cd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542938c r4:85429000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542938c r4:84f4ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cd400 r8:84f4ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ae00 r8:80287e08 r7:eaf85e60 r6:84745500 r5:854cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e1c0 INFO: task kworker/1:420:4938 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d41d7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4941 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:85408c00 r4:85408c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85408c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88e7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85429b8c r4:85429800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85429b8c r4:84f4ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408c00 r8:84f4aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4ae80 r8:80287e08 r7:eaf85e60 r6:84f4af00 r5:85408c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e480 INFO: task kworker/1:421:4941 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d44c8000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4943 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:85409800 r4:85409800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85409800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e9c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85409800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85429f8c r4:85429c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85429f8c r4:84f4af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85409800 r8:84f4afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f4af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f4af80 r8:80287e08 r7:eb4c1e60 r6:846ef000 r5:85409800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e6c0 INFO: task kworker/1:422:4943 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d48fb000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:4946 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e9d84 r8:00000002 r7:60000013 r6:eb4e9d8c r5:8540a400 r4:8540a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472eb00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540a400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab69000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542a38c r4:8542a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542a38c r4:846ef080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540a400 r8:846ef0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef080 r8:80287e08 r7:eb4e5e60 r6:846ef100 r5:8540a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e7c0 INFO: task kworker/1:423:4946 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d4c78000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4947 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:8540b000 r4:8540b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472ed00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542a78c r4:8542a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542a78c r4:846ef180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540b000 r8:846ef1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef180 r8:80287e08 r7:eb4e9e60 r6:846ef200 r5:8540b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e7c0 INFO: task kworker/1:424:4947 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d4c78000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4949 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f1d84 r8:00000002 r7:60000113 r6:eb4f1d8c r5:8540bc00 r4:8540bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472ee80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead53000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542ab8c r4:8542a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542ab8c r4:846ef280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540bc00 r8:846ef2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef280 r8:80287e08 r7:eb4b9e60 r6:846ef300 r5:8540bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e980 INFO: task kworker/1:425:4949 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d50f1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4951 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4951 tgid:4951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:8540c800 r4:8540c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f52f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542b38c r4:8542b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542b38c r4:846ef380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540c800 r8:846ef3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef380 r8:80287e08 r7:eb4f1e60 r6:846ef400 r5:8540c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472ec80 INFO: task kworker/1:426:4951 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d540b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:4953 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:8540d400 r4:8540d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472efc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead71000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542af8c r4:8542ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542af8c r4:846ef480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540d400 r8:846ef4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef480 r8:80287e08 r7:eb4f9e60 r6:846ef500 r5:8540d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472ec80 INFO: task kworker/1:427:4953 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d540b000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4954 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f5d84 r8:00000002 r7:60000013 r6:eb4f5d8c r5:8540e000 r4:8540e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542b78c r4:8542b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542b78c r4:846ef580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540e000 r8:846ef5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef580 r8:80287e08 r7:eb4f9e60 r6:846ef600 r5:8540e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472ec80 INFO: task kworker/1:428:4954 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d5ab9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:4957 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:8540ec00 r4:8540ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542bb8c r4:8542b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542bb8c r4:846ef680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540ec00 r8:846ef6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef680 r8:80287e08 r7:eb4f5e60 r6:846ef700 r5:8540ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60080 INFO: task kworker/1:429:4957 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d5e24000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:4960 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb509d84 r8:00000002 r7:60000113 r6:eb509d8c r5:85408000 r4:85408000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85408000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542bf8c r4:8542bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542bf8c r4:846ef780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408000 r8:846ef7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef780 r8:80287e08 r7:eb501e60 r6:846ef800 r5:85408000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60180 INFO: task kworker/1:430:4960 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d62a4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4961 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb50dd84 r8:00000002 r7:60000013 r6:eb50dd8c r5:85403c00 r4:85403c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85403c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85403c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543038c r4:85430000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543038c r4:846ef880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85403c00 r8:846ef8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef880 r8:80287e08 r7:eb509e60 r6:846ef900 r5:85403c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c602c0 INFO: task kworker/1:431:4961 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d62a4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4962 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:854f8000 r4:854f8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854f8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c607c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543078c r4:85430400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543078c r4:846ef980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f8000 r8:846ef9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ef980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ef980 r8:80287e08 r7:eb50de60 r6:846efa00 r5:854f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb511fb0 to 0xeb511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60540 INFO: task kworker/1:432:4962 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d65ef000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4965 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4965 tgid:4965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:854f8c00 r4:854f8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854f8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85430f8c r4:85430c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85430f8c r4:846efa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f8c00 r8:846efaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846efa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846efa80 r8:80287e08 r7:eb511e60 r6:846efb00 r5:854f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60640 INFO: task kworker/1:433:4965 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d66c2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4966 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb519d84 r8:00000002 r7:60000013 r6:eb519d8c r5:854f9800 r4:854f9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854f9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85430b8c r4:85430800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85430b8c r4:846efb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f9800 r8:846efbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846efb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846efb80 r8:80287e08 r7:eb515e60 r6:846efc00 r5:854f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60840 INFO: task kworker/1:434:4966 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d68ec000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4969 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb521d84 r8:00000002 r7:60000013 r6:eb521d8c r5:854fa400 r4:854fa400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854fa400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543178c r4:85431400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543178c r4:846efc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fa400 r8:846efcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846efc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846efc80 r8:80287e08 r7:eb515e60 r6:846efd00 r5:854fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60b00 INFO: task kworker/1:435:4969 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d6c19000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4972 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:854fc800 r4:854fc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854fc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543238c r4:85432000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543238c r4:846efd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fc800 r8:846efdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846efd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846efd80 r8:80287e08 r7:eb521e60 r6:846efe00 r5:854fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c60d40 INFO: task kworker/1:436:4972 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d6d22000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4973 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb531d84 r8:00000002 r7:60000113 r6:eb531d8c r5:854fd400 r4:854fd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854fd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eac2c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0df000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543138c r4:85431000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8543138c r4:84745580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fd400 r8:847455ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745580 r8:80287e08 r7:eb459e60 r6:846efe80 r5:854fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eac080 INFO: task kworker/0:483:4973 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d6f83000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4975 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4975 tgid:4975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb535d84 r8:00000002 r7:60000113 r6:eb535d8c r5:854fe000 r4:854fe000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854fe000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eac300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85499f8c r4:85499c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85499f8c r4:84745600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fe000 r8:8474562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745600 r8:80287e08 r7:eb531e60 r6:846eff00 r5:854fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eac080 INFO: task kworker/0:484:4975 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d72fa000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4977 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:854cbc00 r4:854cbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb7900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb253000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549af8c r4:8549ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549af8c r4:84745680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cbc00 r8:847456ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745680 r8:80287e08 r7:eb531e60 r6:84745700 r5:854cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eac180 INFO: task kworker/0:485:4977 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d7571000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4980 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:854c8c00 r4:854c8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eacb00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549a38c r4:8549a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549a38c r4:84745780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8c00 r8:847457ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745780 r8:80287e08 r7:eb505e60 r6:84745800 r5:854c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eac180 INFO: task kworker/0:486:4980 is blocked on a mutex likely owned by task kworker/1:93:3664. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d7980000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:4981 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:854fbc00 r4:854fbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854fbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63500 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85431b8c r4:85431800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:438:4983 blocked for more than 466 seconds. r5:854fb000 r4:8291a680 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85431f8c r4:84d55080 r10:61c88647 r9:854fb000 r8:84d550ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00c9d28 to 0xe00c9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:4986 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:4986 tgid:4986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:85509800 r4:85509800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85509800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543278c r4:85432400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543278c r4:84d55180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85509800 r8:84d551ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55180 r8:80287e08 r7:eb52de60 r6:84d55200 r5:85509800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c63700 INFO: task kworker/1:439:4986 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d8099000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4989 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:85508000 r4:85508000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85508000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85508000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb393000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85432b8c r4:85432800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84d55280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: d83e0000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:8550a400 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4992 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb51dd84 r8:00000002 r7:60000013 r6:eb51dd8c r5:8550b000 r4:8550b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63fc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8550b000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543378c r4:85433400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543378c r4:84d55480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550b000 r8:84d554ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55480 r8:80287e08 r7:eb54de60 r6:84d55500 r5:8550b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84c63ac0 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00c9fb0 to 0xe00c9ff8) INFO: task kworker/1:443:4993 blocked for more than 466 seconds. r5:8550bc00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: d8a19000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:8550c800 r4:8550c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df20c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8550c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb567000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85433b8c r4:85433800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85433b8c r4:84d55680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550c800 r8:84d556ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55680 r8:80287e08 r7:eb51de60 r6:84d55700 r5:8550c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84df2000 INFO: task kworker/1:444:4997 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d8a19000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5bf000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8550d400 r8:84d557ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: d8e6e000 e004b000 00000001 80239b98 7f14b000 00000001 r4:00000000 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:5000 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:8550ec00 r4:8550ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df2300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8550ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb573000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85433f8c r4:85433c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85433f8c r4:84d55880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550ec00 r8:84d558ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55880 r8:80287e08 r7:eb565e60 r6:84d55900 r5:8550ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84df2180 INFO: task kworker/1:446:5000 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d90b1000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:5001 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:85508c00 r4:85508c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85508c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544038c r4:85440000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544038c r4:84d55980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85508c00 r8:84d559ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55980 r8:80287e08 r7:eb565e60 r6:84745880 r5:85508c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eceef000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fa0: 00000000 00000000 00000000 00000000 r4:854c9800 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84d55a00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:5004 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:8547ec00 r4:8547ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eacc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8547ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549a78c r4:8549a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549a78c r4:84745980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547ec00 r8:847459ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745980 r8:80287e08 r7:eb505e60 r6:84745a00 r5:8547ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eac980 INFO: task kworker/0:487:5004 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d972e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85500000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84df27c0 Call trace: 9d20: d98c8000 e004b000 00000001 80239b98 7f14b000 00000001 r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:5011 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85502400 r4:85502400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85502400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df2c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85502400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544138c r4:85441000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544138c r4:84d55b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85502400 r8:84d55b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55b00 r8:80287e08 r7:eb565e60 r6:84745b00 r5:85502400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84df29c0 INFO: task kworker/1:450:5011 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d9b18000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:451 state:D stack:0 pid:5012 tgid:5012 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85441f8c r4:85441c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85441f8c r4:84d55b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85500c00 r8:84d55bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55b80 r8:80287e08 r7:eb5d5e60 r6:84745b80 r5:85500c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84df29c0 INFO: task kworker/1:451:5012 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: d9dcf000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:452:5014 blocked for more than 467 seconds. r4:85501800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5df000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d55c80 r8:80287e08 r7:eb5d9e60 r6:84745c80 r5:85504800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84df2c40 INFO: task kworker/1:453:5016 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: da24f000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:5019 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5fdd84 r8:00000002 r7:60000113 r6:eb5fdd8c r5:85506000 r4:85506000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85506000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c63680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85506000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e889b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85442b8c r4:85442800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85442b8c r4:84d55d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85506000 r8:84d55d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55d00 r8:80287e08 r7:eb5d9e60 r6:84745d00 r5:85506000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:5020 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a5d84 r8:00000002 r7:60000113 r6:eb5a5d8c r5:854fec00 r4:854fec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854fec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eac640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ad000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544238c r4:85442000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544238c r4:84d55d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fec00 r8:84d55dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55d80 r8:80287e08 r7:eb5fde60 r6:84d55e00 r5:854fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r5:8526a78c r4:8526a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb601d84 r8:00000002 r7:60000013 r6:eb601d8c r5:8550e000 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544278c r4:85442400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544278c r4:84d55e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550e000 r8:84d55eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d55e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d55e80 r8:80287e08 r7:eb5fde60 r6:84d55f00 r5:8550e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eac3c0 INFO: task kworker/1:456:5023 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: daaf9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:5025 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb605d84 r8:00000002 r7:60000113 r6:eb605d8c r5:85510000 r4:85510000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85510000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ccd040 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: daaf9000 e004b000 00000001 80239b98 7f14b000 00000001 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:5027 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:85510c00 r4:85510c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85510c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ccd300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544338c r4:85443000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544338c r4:84eb0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85510c00 r8:84eb00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0080 r8:80287e08 r7:eb605e60 r6:84eb0100 r5:85510c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccd240 INFO: task kworker/1:458:5027 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dad62000 e004b000 00000001 80239b98 7f14b000 00000001 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85511800 r4:00000000 r9:83018205 r8:85511800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:8544378c r4:85443400 r10:61c88647 r9:85511800 r8:84eb01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:5031 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:85512400 r4:85512400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85512400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ccd800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85512400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85443f8c r4:85443c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85443f8c r4:84eb0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85512400 r8:84eb02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: db0f8000 e004b000 00000001 80239b98 7f14b000 00000001 r4:00000000 r5:8526a78c r4:8526a400 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85513000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r5:85443b8c r4:85443800 r7:ddde2d80 r6:83018200 r5:85443b8c r4:84eb0380 r10:00000000 r9:84eb0380 r8:80287e08 r7:eb60de60 r6:84eb0400 r5:85513000 INFO: task kworker/1:461:5032 is blocked on a mutex likely owned by task kworker/1:93:3664. 9d60: 80230ad0 80239bb0 800f0113 ffffffff r4:e00c9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbb200 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:5034 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:85513c00 r4:85513c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85513c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ccd9c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead41000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bc38c r4:854bc000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bc38c r4:84eb0480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85513c00 r8:84eb04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0480 r8:80287e08 r7:eb60de60 r6:84eb0500 r5:85513c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccd700 INFO: task kworker/1:462:5034 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: db4cf000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe00c9fb0 to 0xe00c9ff8) r4:84fc4380 Workqueue: events bpf_prog_free_deferred r5:85514800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bc78c r4:854bc400 r10:61c88647 r9:85514800 r8:84eb05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8526a78c r4:8526a400 r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:5039 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:85515400 r4:85515400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85515400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ccddc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85515400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bcf8c r4:854bcc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bcf8c r4:84eb0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85515400 r8:84eb06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0680 r8:80287e08 r7:eb619e60 r6:84eb0700 r5:85515400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccd840 INFO: task kworker/1:464:5039 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: db762000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) r4:84fc4380 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:85516000 r4:85516000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85516000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ccdc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85516000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb211000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bcb8c r4:854bc800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bcb8c r4:84eb0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85516000 r8:84eb07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0780 r8:80287e08 r7:eb621e60 r6:84eb0800 r5:85516000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccdb00 INFO: task kworker/1:465:5041 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dbad9000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854bdf8c r4:854bdc00 r10:61c88647 r9:85518000 r8:84eb08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:85518c00 r4:85518c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85518c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb279000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bd38c r4:854bd000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bd38c r4:84eb0980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85518c00 r8:84eb09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0980 r8:80287e08 r7:eb61de60 r6:84eb0a00 r5:85518c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccdd00 INFO: task kworker/1:467:5044 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dbf60000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:85503c00 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb7dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85503c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549b78c r4:8549b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549b78c r4:84745d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85503c00 r8:84745dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745d80 r8:80287e08 r7:eb505e60 r6:84745e00 r5:85503c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb7840 INFO: task kworker/0:488:5047 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dbf60000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:468:5049 blocked for more than 467 seconds. r4:85503000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r9:83018205 r8:85503000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bd78c r4:854bd400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bd78c r4:84eb0a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85503000 r8:84eb0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0a80 r8:80287e08 r7:eb61de60 r6:84745e80 r5:85503000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2280 INFO: task kworker/1:468:5049 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dbf60000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:5050 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85506c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb7c40 r5:8549b38c r4:8549b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549b38c r4:84745f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85506c00 r8:84745f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84745f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84745f00 r8:80287e08 r7:eb629e60 r6:84745f80 r5:85506c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb78c0 INFO: task kworker/0:489:5050 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dc2c7000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:5052 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bdb8c r4:854bd800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84eb0b00 r8:80287e08 r7:eb61de60 r6:84cf0000 r5:85505400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:469:5052 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dc52d000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:5055 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:5055 tgid:5055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:85466c00 r4:85466c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85466c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85568f8c r4:85568c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85568f8c r4:84cf0080 r10:61c88647 r9:85466c00 r8:84cf00ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:5056 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:854d0000 r4:854d0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf29c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb333000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854be78c r4:854be400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854be78c r4:84cf0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d0000 r8:84cf01ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf0180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf0180 r8:80287e08 r7:eb63de60 r6:84cf0200 r5:854d0000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:491:5056 is blocked on a mutex likely owned by task kworker/1:93:3664. Call trace: r4:00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 9fa0: 00000000 00000000 00000000 00000000 r4:84fc4380 task:kworker/1:470 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:854d0c00 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854be38c r4:854be000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854be38c r4:84eb0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d0c00 r8:84eb0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0b80 r8:80287e08 r7:eb61de60 r6:84cf0280 r5:854d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf25c0 INFO: task kworker/1:470:5059 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dcb33000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:5061 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:5061 tgid:5061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb64dd84 r8:00000002 r7:60000013 r6:eb64dd8c r5:854d1800 r4:854d1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3df000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bf38c r4:854bf000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bf38c r4:84eb0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d1800 r8:84eb0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0c00 r8:80287e08 r7:eb649e60 r6:84cf0300 r5:854d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2580 INFO: task kworker/1:471:5061 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dcb33000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:5062 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:854d2400 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854beb8c r4:854be800 r7:ddde2d80 r6:83018200 r5:854beb8c r4:84eb0c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r5:800f0113 r4:80239bb0 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:5065 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:854d3000 r4:854d3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2c40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb377000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bef8c r4:854bec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bef8c r4:84eb0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d3000 r8:84eb0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0d00 r8:80287e08 r7:eb64de60 r6:84cf0400 r5:854d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2900 INFO: task kworker/1:473:5065 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00c9d28 to 0xe00c9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:5068 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:854d3c00 r4:854d3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553478c r4:85534400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553478c r4:84eb0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d3c00 r8:84eb0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0d80 r8:80287e08 r7:eb64de60 r6:84cf0480 r5:854d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2b40 INFO: task kworker/1:474:5068 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dd1a3000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:5069 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:854d5400 r4:854d5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebd3c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb677000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549bb8c r4:8549b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549bb8c r4:84cf0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d5400 r8:84cf052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf0500 r8:80287e08 r7:eb63de60 r6:84cf0580 r5:854d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:846f5f40 INFO: task kworker/0:492:5069 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dd3ad000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:5070 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb675d84 r8:00000002 r7:60000113 r6:eb675d8c r5:854d6000 r4:854d6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bf78c r4:854bf400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bf78c r4:84eb0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d6000 r8:84eb0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0e00 r8:80287e08 r7:eb665e60 r6:84cf0600 r5:854d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2e40 INFO: task kworker/1:475:5070 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dd3ad000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:5073 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000013 r6:eb65dd8c r5:854d6c00 r4:854d6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bfb8c r4:854bf800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bfb8c r4:84eb0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d6c00 r8:84eb0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0e80 r8:80287e08 r7:eb665e60 r6:84cf0680 r5:854d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:5075 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:854d4800 r4:854d4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb693000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ec878c r4:84ec8400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ec878c r4:84eb0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d4800 r8:84eb0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0f00 r8:80287e08 r7:eb665e60 r6:84cf0700 r5:854d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2d80 INFO: task kworker/1:477:5075 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dd605000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:5076 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:84d30000 r4:84d30000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d30000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebd5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d30000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549bf8c r4:8549bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549bf8c r4:84cf0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d30000 r8:84cf07ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf0780 r8:80287e08 r7:eb63de60 r6:84cf0800 r5:84d30000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ebd500 INFO: task kworker/0:493:5076 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:800f0113 r4:80239bb0 r4:e00c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:5079 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:84d30c00 r4:84d30c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d30c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebd940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d30c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ec838c r4:84ec8000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ec838c r4:84cf0880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d30c00 r8:84cf08ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf0880 r8:80287e08 r7:eb63de60 r6:84cf0900 r5:84d30c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ebd440 INFO: task kworker/0:494:5079 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: ddba2000 e004b000 00000001 80239b98 7f14b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:478 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84d31800 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d31800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ab000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bff8c r4:854bfc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bff8c r4:84eb0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d31800 r8:84eb0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84eb0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0f80 r8:80287e08 r7:eb665e60 r6:84cf0980 r5:84d31800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cf2ec0 INFO: task kworker/1:478:5080 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: ddba2000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:5083 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:84d32400 r4:84d32400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d32400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebd600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d32400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ff000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556838c r4:85568000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556838c r4:84cf0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d32400 r8:84cf0a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf0a00 r8:80287e08 r7:eb63de60 r6:84cf0a80 r5:84d32400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ebd7c0 INFO: task kworker/0:495:5083 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: dde15000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:5085 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:5085 tgid:5085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000013 r6:eb6c1d8c r5:84d33000 r4:84d33000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d33000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d33000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553438c r4:85534000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553438c r4:84ccf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d33000 r8:84ccf02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf000 r8:80287e08 r7:eb665e60 r6:84cf0b00 r5:84d33000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4180 INFO: task kworker/1:479:5085 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6cdd84 r8:00000002 r7:60000013 r6:eb6cdd8c r5:84d33c00 r4:84d33c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d33c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85534f8c r4:85534c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85534f8c r4:84ccf080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d33c00 r8:84ccf0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf080 r8:80287e08 r7:eb665e60 r6:84cf0b80 r5:84d33c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4280 INFO: task kworker/1:480:5087 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: de10e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:5089 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d9d84 r8:00000002 r7:60000013 r6:eb6d9d8c r5:84d34800 r4:84d34800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d34800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d34800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85534b8c r4:85534800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85534b8c r4:84ccf100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d34800 r8:84ccf12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf100 r8:80287e08 r7:eb6cde60 r6:84cf0c00 r5:84d34800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4400 INFO: task kworker/1:481:5089 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: de10e000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8526a78c r4:8526a400 r4:84fbb200 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:5091 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000013 r6:eb6e5d8c r5:84d35400 r4:84d35400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d35400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8553538c r4:85535000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:482:5091 is blocked on a mutex likely owned by task kworker/1:93:3664. 9d20: de3a6000 e004b000 00000001 80239b98 7f14b000 00000001 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:5093 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84d36000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84d36000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 r5:85535f8c r4:85535c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85535f8c r4:84ccf200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d36000 r8:84ccf22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf200 r8:80287e08 r7:eb6e5e60 r6:84cf0d00 r5:84d36000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4640 INFO: task kworker/1:483:5093 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: de817000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84d36c00 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb6f3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553578c r4:85535400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553578c r4:84ccf280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d36c00 r8:84ccf2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf280 r8:80287e08 r7:eb6f1e60 r6:84cf0d80 r5:84d36c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4900 INFO: task kworker/1:484:5094 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: de9bc000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:854d8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7040 r5:8556878c r4:85568400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84cf0e00 r8:80287e08 r7:eb63de60 r6:84cf0e80 r5:854d8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:854d8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85535b8c r4:85535800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85535b8c r4:84ccf300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d8c00 r8:84ccf32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf300 r8:80287e08 r7:eb6f1e60 r6:84cf0f00 r5:854d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb709fb0 to 0xeb709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4b00 INFO: task kworker/1:485:5100 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: deea4000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:5102 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:5102 tgid:5102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb729d84 r8:00000002 r7:60000113 r6:eb729d8c r5:854d9800 r4:854d9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7440 r5:85568b8c r4:85568800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854d9800 r8:84cf0fac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: df279000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:5103 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb715d84 r8:00000002 r7:60000113 r6:eb715d8c r5:8551bc00 r4:8551bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8553638c r4:85536000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fbb200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:8551c800 r4:8551c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cf2280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8551c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553678c r4:85536400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553678c r4:84ccf480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551c800 r8:84ccf4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf480 r8:80287e08 r7:eb715e60 r6:84ccf500 r5:8551c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4c00 INFO: task kworker/1:487:5105 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00c9d28 to 0xe00c9d70) 9d20: df3b3000 e004b000 00000001 80239b98 7f14b000 00000001 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 9d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 Exception stack(0xe00c9fb0 to 0xe00c9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:8551d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc1140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8551d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb747000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85536b8c r4:85536800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85536b8c r4:84ccf580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551d400 r8:84ccf5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccf580 r8:80287e08 r7:eb739e60 r6:84ccf600 r5:8551d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb4980 INFO: task kworker/1:488:5107 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 r4:e00c9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:5109 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000013 r6:eb751d8c r5:8551b000 r4:8551b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc1400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8551b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 r5:85536f8c r4:85536c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8551b000 r8:84ccf6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00c9d28 to 0xe00c9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfd69000 r5:8553778c r4:85537400 r7:ddde2d80 r6:83018200 r5:8553778c r4:84ccf780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d6c00 r8:80200be4 r7:e00c9d5c r6:ffffffff r5:844d6c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b87a80 r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:84fbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:84fbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:5113 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:8551e000 r4:8551e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8551e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab99000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556938c r4:85569000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556938c r4:84e8e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551e000 r8:84e8e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e8e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e8e080 r8:80287e08 r7:eb63de60 r6:84ccf880 r5:8551e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc7480 INFO: task kworker/0:498:5113 is blocked on a mutex likely owned by task kworker/1:93:3664. task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe00c9d28 to 0xe00c9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00c9dc0 r5:e00c9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc4380 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:5115 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb735d84 r8:00000002 r7:60000113 r6:eb735d8c r5:854da400 r4:854da400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854da400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854da400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa93000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553738c r4:85537000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553738c r4:84ccf900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854da400 r8:84ccf92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccf900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:491:5115 is blocked on a mutex likely owned by task kworker/1:93:3664. r5:800f0113 r4:80239bb0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:492 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:854db000 r4:854db000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854db000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc1c40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854db000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14b000 e004b000 8280c928 82ac21c4 e00c9da4 e00c9da8 e00c9d78 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe00c9fb0 to 0xe00c9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r5:85537b8c r4:85537800 r7:ddde2d80 r6:83018200 r5:85537b8c r4:84ccfa00 r4:00000001 task:kworker/1:93 state:R running task stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e00c9dc0 r5:8526a78c r4:8526a400 r10:00000000 r9:84fbb200 r8:80287e08 r7:e0079e60 r6:84fbcd80 r5:844d6c00 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc1e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553878c r4:85538400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553878c r4:84ccfa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854dbc00 r8:84ccfaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccfa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccfa80 r8:80287e08 r7:eb525e60 r6:84e8e280 r5:854dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc1900 INFO: task kworker/1:494:5121 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85538b8c r4:85538800 r10:61c88647 r9:854dd400 r8:84ccfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84ccfb00 r8:80287e08 r7:eb56de60 r6:84e8e300 r5:854dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc1a00 INFO: task kworker/1:495:5123 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:5126 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:5126 tgid:5126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:854dec00 r4:854dec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854dec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c78c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556bf8c r4:8556bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556bf8c r4:84e8e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854dec00 r8:84e8e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e8e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e8e380 r8:80287e08 r7:eb775e60 r6:84e8e400 r5:854dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc7b40 INFO: task kworker/0:499:5126 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d60: 80230ad0 80239bb0 900e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:854de000 r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebbc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854de000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556978c r4:85569400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556978c r4:84e8e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854de000 r8:84e8e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e8e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e8e480 r8:80287e08 r7:eb579e60 r6:84e8e500 r5:854de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc7b40 INFO: task kworker/0:500:5127 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8553978c r4:85539400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84ccfb80 r8:80287e08 r7:eb585e60 r6:84e8e580 r5:854e0c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:5132 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:5132 tgid:5132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:854e2400 r4:854e2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc1340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85538f8c r4:85538c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85538f8c r4:84ccfc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e2400 r8:84ccfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccfc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccfc00 r8:80287e08 r7:eb5a1e60 r6:84e8e600 r5:854e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc1d80 INFO: task kworker/1:497:5132 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:5135 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:854e3c00 r4:854e3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4d00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae35000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553938c r4:85539000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553938c r4:84ccfc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e3c00 r8:84ccfcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccfc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccfc80 r8:80287e08 r7:eb5a1e60 r6:84e8e680 r5:854e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb6040 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85539f8c r4:85539c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854e1800 r8:84ccfd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:5137 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:854e3000 r4:854e3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb6380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85539b8c r4:85539800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85539b8c r4:84ccfd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e3000 r8:84ccfdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccfd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccfd80 r8:80287e08 r7:eb77de60 r6:84e8e780 r5:854e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb6140 INFO: task kworker/1:500:5137 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:5141 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:854e4800 r4:854e4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e4800 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:854e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:8553a38c r4:8553a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ccfe00 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854e5400 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8553af8c r4:8553ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854e5400 r8:84ccfeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccfe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccfe80 r8:80287e08 r7:eb791e60 r6:84e8e880 r5:854e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:e00a9dc0 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r9:83018205 r8:85519800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:8553a78c r4:8553a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ccff00 r8:80287e08 r7:eb795e60 r6:84ccff80 r5:85519800 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8551ec00 r4:00000000 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8553ab8c r4:8553a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553ab8c r4:84cf6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551ec00 r8:84cf602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6000 r8:80287e08 r7:eb795e60 r6:84cf6080 r5:8551ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb6580 INFO: task kworker/1:504:5146 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:5148 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:85516c00 r4:85516c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8553b38c r4:8553b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553b38c r4:84cf6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85516c00 r8:84cf612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6100 r8:80287e08 r7:eb795e60 r6:84cf6180 r5:85516c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb6840 INFO: task kworker/1:505:5148 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:506 state:D stack:0 pid:5151 tgid:5151 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553b78c r4:8553b400 r7:ddde2d80 r6:83018200 r5:8553b78c r4:84cf6200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:e00a9dc0 r5:00001000 r4:e0065000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:507:5152 blocked for more than 468 seconds. r4:85520c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553bf8c r4:84cf6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85520c00 r8:84cf632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6300 r8:80287e08 r7:eb7a9e60 r6:84cf6380 r5:85520c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb6a80 INFO: task kworker/1:507:5152 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:5155 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:5155 tgid:5155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:85521800 r4:85521800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85521800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb6e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85521800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8553bb8c r4:8553b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553bb8c r4:84cf6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85521800 r8:84cf642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6400 r8:80287e08 r7:eb7ade60 r6:84cf6480 r5:85521800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84eb6cc0 INFO: task kworker/1:508:5155 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:5156 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:5156 tgid:5156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b5d84 r8:00000002 r7:60000113 r6:eb7b5d8c r5:85522400 r4:85522400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85522400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cc7980 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554038c r4:85540000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84cf6500 r8:80287e08 r7:eb7ade60 r6:84cf6580 r5:85522400 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:510:5158 blocked for more than 468 seconds. r4:85523000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 r9:83018205 r8:85523000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:8554078c r4:85540400 r7:ddde2d80 r6:83018200 r5:8554078c r4:84cf6600 r10:00000000 r9:84cf6600 r8:80287e08 r7:eb7b5e60 r6:84cf6680 r5:85523000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:5160 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000013 r6:eb7bdd8c r5:85523c00 r4:85523c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85523c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e260c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85523c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85540b8c r4:85540800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85540b8c r4:84cf6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85523c00 r8:84cf672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6700 r8:80287e08 r7:eb7b9e60 r6:84cf6780 r5:85523c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cc1600 INFO: task kworker/1:511:5160 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:e0065000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:5162 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c1d84 r8:00000002 r7:60000113 r6:eb7c1d8c r5:85524800 r4:85524800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85524800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e264c0 r4:00000000 r9:83018205 r8:85524800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:8554138c r4:85541000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554138c r4:84cf6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85524800 r8:84cf682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6800 r8:80287e08 r7:eb7bde60 r6:84cf6880 r5:85524800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26000 INFO: task kworker/1:512:5162 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:e00a9dc0 r5:00001000 r4:e0065000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85526000 r4:8291a680 r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e269c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85526000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85541f8c r4:85541c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85541f8c r4:84e8e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85526000 r8:84e8e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e8e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e8e900 r8:80287e08 r7:eb579e60 r6:84e8e980 r5:85526000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ebbb00 INFO: task kworker/0:501:5163 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854e0000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26400 r5:85540f8c r4:85540c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:5168 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:854e6000 r4:854e6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554178c r4:85541400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554178c r4:84cf6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e6000 r8:84cf69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6980 r8:80287e08 r7:eb7c1e60 r6:84e8ea80 r5:854e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26380 INFO: task kworker/1:514:5168 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:5170 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:84dc9800 r4:84dc9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dc9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84dc9800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554278c r4:85542400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554278c r4:84cf6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dc9800 r8:84cf6a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6a00 r8:80287e08 r7:eb7d1e60 r6:84e8eb00 r5:84dc9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26480 INFO: task kworker/1:515:5170 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85541b8c r4:85541800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dca400 r8:84cf6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6a80 r8:80287e08 r7:eb7dde60 r6:84e8eb80 r5:84dca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26480 INFO: task kworker/1:516:5171 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ca2f8c r4:84ca2c00 r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:84dc8c00 r4:8291a680 r4:00000000 r4:00000000 r5:8554238c r4:85542000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84dc8c00 r8:84cf6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 900e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/0:502:5176 blocked for more than 468 seconds. r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000113 r6:eb7e5d8c r5:84dcb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb829000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85569b8c r4:85569800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85569b8c r4:84e8ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dcb000 r8:84e8ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e8ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e8ec80 r8:80287e08 r7:eb579e60 r6:84e8ed00 r5:84dcb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ebb700 INFO: task kworker/0:502:5176 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85542b8c r4:84cf6b80 r10:00000000 r9:84cf6b80 r8:80287e08 r7:eb7dde60 r6:84e8ed80 r5:84dcbc00 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:5180 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85528000 r4:85528000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85528000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26140 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85528000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb815000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554338c r4:85543000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554338c r4:84cf6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85528000 r8:84cf6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6c00 r8:80287e08 r7:eb805e60 r6:84cf6c80 r5:85528000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26ac0 INFO: task kworker/1:519:5180 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85528c00 r4:8291a680 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26f00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85528c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb80d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85542f8c r4:85542c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85542f8c r4:84cf6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85528c00 r8:84cf6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6d00 r8:80287e08 r7:eb595e60 r6:84cf6d80 r5:85528c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26a00 INFO: task kworker/1:520:5182 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 task:kworker/1:521 state:D stack:0 pid:5184 tgid:5184 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r9:83018205 r8:8552b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:8554378c r4:85543400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb82dfb0 to 0xeb82dff8) r4:855a4000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 task:kworker/1:522 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8552a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb849000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85543b8c r4:85543800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85543b8c r4:84cf6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552a400 r8:84cf6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cf6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf6f00 r8:80287e08 r7:eb82de60 r6:84cf6f80 r5:8552a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb839fb0 to 0xeb839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4200 INFO: task kworker/1:522:5186 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85569f8c r4:85569c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85569f8c r4:84e24000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552c800 r8:84e2402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24000 r8:80287e08 r7:eb839e60 r6:84e24080 r5:8552c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4200 INFO: task kworker/1:523:5188 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84dcc800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8556a78c r4:8556a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84dcc800 r8:84e8ee2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:5192 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb855d84 r8:00000002 r7:60000113 r6:eb855d8c r5:84dcd400 r4:84dcd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dcd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84dcd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554c38c r4:8554c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554c38c r4:84e24100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dcd400 r8:84e2412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24100 r8:80287e08 r7:eb839e60 r6:84e8ef00 r5:84dcd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4000 INFO: task kworker/1:524:5192 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:5194 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb861d84 r8:00000002 r7:60000013 r6:eb861d8c r5:84dce000 r4:84dce000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dce000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eb851000 r5:85543f8c r4:85543c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84dce000 r8:84e241ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855a4700 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84ca2f8c r4:84ca2c00 r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:8552e000 r4:8552e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8552e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8552e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554cf8c r4:8554cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554cf8c r4:84e24300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552e000 r8:84e2432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24300 r8:80287e08 r7:eb83de60 r6:84e24380 r5:8552e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4940 INFO: task kworker/1:527:5197 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:5199 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:84dcec00 r4:84dcec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dcec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84dcec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb871000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554cb8c r4:8554c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554cb8c r4:84e24400 r10:61c88647 r9:84dcec00 r8:84e2442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24400 r8:80287e08 r7:eb879e60 r6:84e23000 r5:84dcec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4c00 INFO: task kworker/1:528:5199 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:854e6c00 r4:8291a680 r4:00000000 r4:00000000 r5:8554d78c r4:8554d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554d78c r4:84e24480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e6c00 r8:84e244ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24480 r8:80287e08 r7:eb879e60 r6:84e23080 r5:854e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4d40 INFO: task kworker/1:529:5202 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 task:kworker/1:530 state:D stack:0 pid:5204 tgid:5204 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r9:83018205 r8:84c90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 r5:8554d38c r4:8554d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:e0065000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:531 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20040 r5:8554db8c r4:8554d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554db8c r4:84e24580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c90000 r8:84e245ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24580 r8:80287e08 r7:eb671e60 r6:84e23180 r5:84c90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26840 INFO: task kworker/1:531:5206 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:5207 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:84c92400 r4:84c92400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c92400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e205c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c92400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac89000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554e78c r4:8554e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554e78c r4:84e24600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c92400 r8:84e2462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24600 r8:80287e08 r7:eb6b9e60 r6:84e23200 r5:84c92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:533 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8554df8c r4:8554dc00 r10:61c88647 r9:84c94800 r8:84e246ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e20200 INFO: task kworker/1:533:5210 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:5211 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8554e38c r4:8554e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85529800 r8:84e2472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:535 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8552d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554ef8c r4:8554ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554ef8c r4:84e24800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552d400 r8:84e2482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24800 r8:80287e08 r7:eb6c9e60 r6:84e24880 r5:8552d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e203c0 INFO: task kworker/1:535:5214 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:5216 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb661d84 r8:00000002 r7:60000113 r6:eb661d8c r5:85526c00 r4:85526c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85526c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85526c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1d000 r5:8554eb8c r4:8554e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554eb8c r4:84e24900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85526c00 r8:84e2492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24900 r8:80287e08 r7:eb6e1e60 r6:84e24980 r5:85526c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e20500 INFO: task kworker/1:536:5216 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:5218 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb705d84 r8:00000002 r7:60000013 r6:eb705d8c r5:85525400 r4:85525400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85525400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20cc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8554f38c r4:8554f000 r10:61c88647 r9:85525400 r8:84e24a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:5221 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6f9d84 r8:00000002 r7:60000113 r6:eb6f9d8c r5:84c93c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556af8c r4:8556ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20e00 r5:8554f78c r4:8554f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e20b40 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 9d60: 80230ad0 80239bb0 900e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:5225 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:84c95400 r4:84c95400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c95400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c95400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554fb8c r4:8554f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554fb8c r4:84e24b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84e24b80 r8:80287e08 r7:eb711e60 r6:84e23480 r5:84c95400 r4:84e20d00 Workqueue: events bpf_prog_free_deferred 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:00000000 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:5227 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:84c96c00 r4:84c96c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c96c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e20500 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554ff8c r4:8554fc00 r7:ddde2d80 r6:83018200 r5:8554ff8c r4:84e24c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:541:5229 blocked for more than 469 seconds. r4:84c96000 r4:00000000 r4:00000000 r5:8555038c r4:85550000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c96000 r8:84e24cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24c80 r8:80287e08 r7:eb74de60 r6:84e23580 r5:84c96000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e20e40 INFO: task kworker/1:541:5229 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7f64c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:5231 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb765d84 r8:00000002 r7:60000113 r6:eb765d8c r5:84c91800 r4:84c91800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c91800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ac340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c91800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85550b8c r4:85550800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85550b8c r4:84e24d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e20c00 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84dc8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:8555078c r4:85550400 r4:84e24d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:5235 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:85618000 r4:85618000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85618000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ac480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85618000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb351000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85550f8c r4:85550c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85550f8c r4:84e24e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85618000 r8:84e24e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e24e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e24e00 r8:80287e08 r7:eb765e60 r6:84e23700 r5:85618000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ac040 INFO: task kworker/1:544:5235 is blocked on a mutex likely owned by task kworker/0:181:3662. Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:5237 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:85619800 r4:85619800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85619800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ac5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85619800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555138c r4:85551000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85619800 r8:84e24eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r4:00000000 r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:5239 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb895d84 r8:00000002 r7:60000013 r6:eb895d8c r5:85618c00 r4:85618c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85618c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ac840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85618c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f7000 r5:85551b8c r4:85551800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8555178c r4:84e24f80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:5242 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000113 r6:eb8a1d8c r5:8561c800 r4:8561c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r5:00001000 r4:eb68f000 r5:8555238c r4:85552000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8561c800 r8:855af02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:549:5244 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:855e0000 r4:855e0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ac980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85551f8c r4:85551c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85551f8c r4:855af080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e0000 r8:855af0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855af080 r8:80287e08 r7:eb8a1e60 r6:855af100 r5:855e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ac640 INFO: task kworker/1:549:5244 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:82ac21e4 r4:e00a9dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8555338c r4:855af180 Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) r4:855ac940 INFO: task kworker/1:550:5247 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:5248 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b1d84 r8:00000002 r7:60000013 r6:eb8b1d8c r5:8561bc00 r4:8561bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855acc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8561bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ad000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555278c r4:85552400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555278c r4:855af280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561bc00 r8:855af2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855af280 r8:80287e08 r7:eb8a5e60 r6:84e23980 r5:8561bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ac940 INFO: task kworker/1:551:5248 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855acdc0 r5:85552b8c r4:85552800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8561a400 r8:855af32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:5252 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85552f8c r4:85552c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85552f8c r4:855af380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:855acc40 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae93000 r5:85553b8c r4:85553800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85553b8c r4:855af400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561ec00 r8:855af42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855af400 r8:80287e08 r7:eb8a5e60 r6:84e23b00 r5:8561ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855acd80 INFO: task kworker/1:554:5253 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:5256 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:5256 tgid:5256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:8561d400 r4:8561d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b4d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8561d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556b38c r4:8556b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556b38c r4:84e23b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561d400 r8:84e23bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e23b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85620000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00a9fb0 to 0xe00a9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:85620c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5b80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85620c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569738c r4:85697000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8569738c r4:84e23d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85620c00 r8:84e23dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e23d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e23d80 r8:80287e08 r7:eb579e60 r6:84e23e00 r5:85620c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855b4cc0 INFO: task kworker/0:507:5260 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 task:kworker/1:555 state:D stack:0 pid:5263 tgid:5263 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555378c r4:85553400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555378c r4:855af480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85622400 r8:855af4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855af480 r8:80287e08 r7:eb5c5e60 r6:84e23e80 r5:85622400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85275500 INFO: task kworker/1:555:5263 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 r4:82ac21e4 r4:e00a9dc0 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fbcc80 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:556:5266 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r5:85623000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ba340 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85553f8c r4:85553c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fbcc80 r4:00000001 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:557 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85623c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ba800 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85554f8c r4:85554c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85554f8c r4:855af580 r10:61c88647 r9:85623c00 r8:855af5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r4:e00a9dc0 r4:00000000 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:5270 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:85621800 r4:85621800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85621800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ba440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85621800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0411000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555438c r4:85554000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555438c r4:855af600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85621800 r8:855af62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:855ba1c0 Workqueue: events bpf_prog_free_deferred [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:900e0113 r4:80239bb0 r4:e00a9dc0 r4:00000000 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555478c r4:85554400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555478c r4:855af680 r10:61c88647 r9:85624800 r8:855af6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) r4:855ba240 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:900e0113 r4:80239bb0 r4:e00a9dc0 r4:00000000 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000013 r6:eb8d5d8c r5:85625400 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ba240 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85554b8c r4:85554800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85554b8c r4:855af700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85625400 r8:855af72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855af700 r8:80287e08 r7:eb6a5e60 r6:855c4100 r5:85625400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:82ac21e4 r4:e00a9dc0 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:561:5276 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85626000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r5:8555538c r4:85555000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85626000 r8:855af7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:855af780 r8:80287e08 r7:eb6a5e60 r6:855c4180 r5:85626000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Not tainted 6.15.0-rc5-syzkaller #0 r4:85626c00 r4:00000000 r4:00000000 r5:8555578c r4:85555400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855af800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:563:5280 blocked for more than 469 seconds. r4:84e48000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bac00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e48000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85555b8c r4:85555800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85555b8c r4:855af880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e48000 r8:855af8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855af880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:564:5283 blocked for more than 469 seconds. r4:84e48c00 r4:00000000 r4:00000000 r5:85555f8c r4:85555c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855af900 r8:80287e08 r7:eb8e5e60 r6:855c4300 r5:84e48c00 r4:855baa80 INFO: task kworker/1:564:5283 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 r5:00001000 r4:e0065000 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r5:8555638c r4:85556000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r5:8555678c r4:85556400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555678c r4:855afa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4a400 r8:855afa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855afa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855afa00 r8:80287e08 r7:eb8e9e60 r6:855c4400 r5:84e4a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bacc0 INFO: task kworker/1:566:5287 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Workqueue: events bpf_prog_free_deferred [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85556b8c r4:85556800 Exception stack(0xeb741fb0 to 0xeb741ff8) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:5291 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:855e6000 r4:855e6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c7a00 r5:843bab8c r4:843ba800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84701a00 Exception stack(0xe00a9d28 to 0xe00a9d70) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:855e3000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc5-syzkaller #0 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:855e4800 r8:855c452c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c4500 r8:80287e08 r7:eb789e60 r6:855afe00 r5:855e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855c7880 INFO: task kworker/0:509:5297 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84ec8f8c r4:84ec8c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:e0065000 r4:00000001 INFO: task kworker/1:570:5301 blocked for more than 469 seconds. r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8552ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555738c r4:85557000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555738c r4:855aff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552ec00 r8:855aff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855aff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855aff00 r8:80287e08 r7:eb8fde60 r6:855aff80 r5:8552ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bb600 INFO: task kworker/1:570:5301 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:00000000 r4:84fbcc80 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:855e9800 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85557b8c r4:85557800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85557b8c r4:855b6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e9800 r8:855b612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b6100 r8:80287e08 r7:eb915e60 r6:855b6180 r5:855e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bba80 INFO: task kworker/1:572:5305 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:84fc3840 r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:855eb000 r5:00001000 r4:eb827000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb891d84 r8:00000002 r7:60000013 r6:eb891d8c r5:855e8c00 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbf00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85557f8c r4:85557c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85557f8c r4:855b6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8c00 r8:855b62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b6280 r8:80287e08 r7:eb915e60 r6:855b6300 r5:855e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bbd80 INFO: task kworker/1:573:5309 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fc3840 r4:855ebc00 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fbcc80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85560b8c r4:85560800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85560b8c r4:855b6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ec800 r8:855b64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b6480 r8:80287e08 r7:eb7d5e60 r6:855b6500 r5:855ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bd080 INFO: task kworker/1:575:5314 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:e00a9dc0 r5:00001000 r4:e0065000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:8291a684 r9:eb921d84 r8:00000002 r7:60000113 r6:eb921d8c r5:855ed400 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855ed400 r8:855b65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r5:00001000 r4:e0065000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:5318 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:855ee000 r4:855ee000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bd200 INFO: task kworker/1:577:5318 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd9c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85561f8c r4:85561c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85561f8c r4:855b6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855eec00 r8:855b67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b6780 r8:80287e08 r7:eb925e60 r6:855b6800 r5:855eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:900e0113 r4:80239bb0 r5:00001000 r4:e0065000 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:855b6880 r8:80287e08 r7:eb92de60 r6:855b6900 r5:855ea400 Exception stack(0xe00a9d28 to 0xe00a9d70) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) Exception stack(0xe00a9fb0 to 0xe00a9ff8) [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e6c00 r8:855b69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b6980 r8:80287e08 r7:eb92de60 r6:855b6a00 r5:855e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bd740 INFO: task kworker/1:580:5323 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:5325 blocked for more than 469 seconds. r10:8291a684 r9:eb935d84 r8:00000002 r7:60000113 r6:eb935d8c r5:855e1800 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:e0065000 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0065000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:5329 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb93dd84 r8:00000002 r7:60000113 r6:eb93dd8c r5:855f0c00 r4:855f0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bddc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85562b8c r4:85562800 r7:ddde2d80 r6:83018200 r5:85562b8c r4:855b6c80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 900e0113 ffffffff [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:5331 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:855f1800 r4:855f1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855bdbc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:84ca2f8c r4:84ca2c00 9fa0: 00000000 00000000 00000000 00000000 r4:855f2400 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb945fb0 to 0xeb945ff8) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r5:855f3000 r4:8291a680 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r4:e00a9dc0 r5:84ca2f8c r4:84ca2c00 9fa0: 00000000 00000000 00000000 00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c7b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556378c r4:85563400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556378c r4:855d6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f3c00 r8:855d60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6080 r8:80287e08 r7:eb949e60 r6:855d6100 r5:855f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d60: 80230ad0 80239bb0 900e0113 ffffffff r4:00000000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855db300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:5341 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb94dd84 r8:00000002 r7:60000113 r6:eb94dd8c r5:855f5400 r4:855f5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc3840 r10:8291a684 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:84e4b000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569438c r4:85694000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569438c r4:855d6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4b000 r8:855d63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6380 r8:80287e08 r7:eb94de60 r6:855c4680 r5:84e4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855db380 INFO: task kworker/1:590:5344 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:5345 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb969d84 r8:00000002 r7:60000013 r6:eb969d8c r5:84e4bc00 r4:84e4bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e4bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855db8c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85694f8c r4:85694c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:5347 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb971d84 r8:00000002 r7:60000013 r6:eb971d8c r5:84e4c800 r4:84e4c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e4c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85694b8c r4:85694800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:84e4e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e4e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaaf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85696b8c r4:85696800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85696b8c r4:855d6500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4e000 r8:855d652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6500 r8:80287e08 r7:eb969e60 r6:855c4800 r5:84e4e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855db6c0 INFO: task kworker/1:593:5348 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:5350 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:5350 tgid:5350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eb80f000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc3840 task:kworker/1:595 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eb819000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea0000 r8:855d662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6600 r8:80287e08 r7:eb975e60 r6:855c4900 r5:84ea0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855dbac0 INFO: task kworker/1:595:5353 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 7fb69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 900e0113 ffffffff r5:900e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:5354 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:855f6000 r4:855f6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb97dfb0 to 0xeb97dff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 80dae000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea93d000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85696f8c r4:85696c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb985fb0 to 0xeb985ff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:5358 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb989d84 r8:00000002 r7:60000013 r6:eb989d8c r5:855f9800 r4:855f9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569638c r4:85696000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569638c r4:855d6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f9800 r8:855d682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6800 r8:80287e08 r7:eb975e60 r6:855d6880 r5:855f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb989fb0 to 0xeb989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d20: 8100f000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:5360 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:855fa400 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569678c r4:85696400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569678c r4:855d6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fa400 r8:855d692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xeb95dfb0 to 0xeb95dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:599:5363 blocked for more than 470 seconds. task:kworker/1:599 state:D stack:0 pid:5363 tgid:5363 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:855fbc00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dfb80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead6f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569778c r4:85697400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569778c r4:855d6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fbc00 r8:855d6a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6a00 r8:80287e08 r7:eb975e60 r6:855d6a80 r5:855fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855df2c0 INFO: task kworker/1:599:5363 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 81470000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:5366 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:855fd400 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855fd400 r8:855d6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 816fb000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855c4a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 816fb000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:5370 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:84ea2400 r4:84ea2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb87f000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ec8b8c r4:84ec8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb98dfb0 to 0xeb98dff8) r4:855d5b40 Call trace: 9d20: 81a6d000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:601 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ea3000 r8:855d6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 81ef5000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:5374 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb999d84 r8:00000002 r7:60000013 r6:eb999d8c r5:84ea3c00 r4:84ea3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ea3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569c78c r4:8569c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569c78c r4:855d6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea3c00 r8:855d6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6c00 r8:80287e08 r7:eb995e60 r6:855c4d00 r5:84ea3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855dfac0 INFO: task kworker/1:602:5374 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 81ef5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:5376 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:84ea4800 r4:84ea4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ea4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569c38c r4:8569c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569c38c r4:855d6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea4800 r8:855d6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6c80 r8:80287e08 r7:eb999e60 r6:855c4d80 r5:84ea4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855dfac0 INFO: task kworker/1:603:5376 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8238b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:604:5379 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:604 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000113 r6:eb9bdd8c r5:84ea6c00 r4:84ea6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ea6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569cb8c r4:8569c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569cb8c r4:855d6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea6c00 r8:855d6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6d80 r8:80287e08 r7:eb999e60 r6:855c4e00 r5:84ea6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855dff40 INFO: task kworker/1:604:5379 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 829db000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:5381 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:84ea5400 r4:84ea5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855db5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ea5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569cf8c r4:8569cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569cf8c r4:855d6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea5400 r8:855d6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6d00 r8:80287e08 r7:eb9bde60 r6:855c4e80 r5:84ea5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855df6c0 INFO: task kworker/1:605:5381 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 829db000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:5382 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:5382 tgid:5382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:84ea6000 r4:84ea6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659500 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ea6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9fb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569df8c r4:8569dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569df8c r4:855d6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea6000 r8:855d6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6e00 r8:80287e08 r7:eb9c1e60 r6:855c4f00 r5:84ea6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855df6c0 INFO: task kworker/1:606:5382 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 82f61000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:84fc3840 INFO: task kworker/1:607:5384 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000113 r6:eb9ddd8c r5:85600000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eb9d3000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569d38c r4:8569d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 82f61000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:5386 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:5386 tgid:5386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000113 r6:eb9e1d8c r5:85600c00 r4:85600c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85600c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85656e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85600c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559c38c r4:8559c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559c38c r4:8565e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85600c00 r8:8565e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e000 r8:80287e08 r7:eb8b9e60 r6:8565e080 r5:85600c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85656540 INFO: task kworker/0:515:5386 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 82f61000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:5387 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:5387 tgid:5387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e5d84 r8:00000002 r7:60000013 r6:eb9e5d8c r5:85601800 r4:85601800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85601800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659240 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85601800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569d78c r4:8569d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569d78c r4:855d6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85601800 r8:855d6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6e80 r8:80287e08 r7:eb9c5e60 r6:8565e100 r5:85601800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659000 INFO: task kworker/1:608:5387 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 833d4000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:5389 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f1d84 r8:00000002 r7:60000013 r6:eb9f1d8c r5:85602400 r4:85602400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85602400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85602400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569db8c r4:8569d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569db8c r4:855d6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85602400 r8:855d6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855d6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d6f80 r8:80287e08 r7:eb9c5e60 r6:8565e180 r5:85602400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659000 INFO: task kworker/1:609:5389 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 833d4000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:5391 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba05d84 r8:00000002 r7:60000013 r6:eba05d8c r5:85603000 r4:85603000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85603000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85603000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569f38c r4:8569f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569f38c r4:85654000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85603000 r8:8565402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654000 r8:80287e08 r7:eb9c5e60 r6:8565e200 r5:85603000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659300 INFO: task kworker/1:610:5391 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 83816000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:5393 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:5393 tgid:5393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000113 r6:eba09d8c r5:85603c00 r4:85603c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85603c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85603c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569e38c r4:8569e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569e38c r4:85654080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85603c00 r8:856540ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654080 r8:80287e08 r7:eba05e60 r6:8565e280 r5:85603c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659140 INFO: task kworker/1:611:5393 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 83e62000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:5395 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba15d84 r8:00000002 r7:60000013 r6:eba15d8c r5:85604800 r4:85604800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85604800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85604800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569e78c r4:8569e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569e78c r4:85654100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85604800 r8:8565412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654100 r8:80287e08 r7:eba05e60 r6:8565e300 r5:85604800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659440 INFO: task kworker/1:612:5395 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 84334000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:5398 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba29d84 r8:00000002 r7:60000013 r6:eba29d8c r5:85605400 r4:85605400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85605400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856598c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85605400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569eb8c r4:8569e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569eb8c r4:85654180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85605400 r8:856541ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654180 r8:80287e08 r7:eba05e60 r6:8565e380 r5:85605400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659740 INFO: task kworker/1:613:5398 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 84334000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:5399 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:5399 tgid:5399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba2dd84 r8:00000002 r7:60000013 r6:eba2dd8c r5:85606000 r4:85606000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85606000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659a40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85606000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569ef8c r4:8569ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569ef8c r4:85654200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85606000 r8:8565422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654200 r8:80287e08 r7:eba05e60 r6:8565e400 r5:85606000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856595c0 INFO: task kworker/1:614:5399 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 84414000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:5401 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba39d84 r8:00000002 r7:60000013 r6:eba39d8c r5:85606c00 r4:85606c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85606c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85606c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba63000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569fb8c r4:8569f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569fb8c r4:85654280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85606c00 r8:856542ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654280 r8:80287e08 r7:eba05e60 r6:8565e480 r5:85606c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659440 INFO: task kworker/1:615:5401 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 84414000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:5404 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000013 r6:eb9d1d8c r5:84e38000 r4:84e38000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e38000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e38000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569f78c r4:8569f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569f78c r4:85654300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e38000 r8:8565432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654300 r8:80287e08 r7:eba39e60 r6:8565e500 r5:84e38000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659b40 INFO: task kworker/1:616:5404 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 84be5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:5406 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a9d84 r8:00000002 r7:60000113 r6:eb9a9d8c r5:84e38c00 r4:84e38c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e38c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85656f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84e38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559c78c r4:8559c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559c78c r4:8565e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e38c00 r8:8565e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e580 r8:80287e08 r7:eb8b9e60 r6:8565e600 r5:84e38c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85656ec0 INFO: task kworker/0:516:5406 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 850ed000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:5408 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:84e39800 r4:84e39800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e39800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85660780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84e39800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0577000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559cf8c r4:8559cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559cf8c r4:8565e680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e39800 r8:8565e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e680 r8:80287e08 r7:eb8b9e60 r6:8565e700 r5:84e39800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85656e00 INFO: task kworker/0:517:5408 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 853d5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:617:5409 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:617 state:D stack:0 pid:5409 tgid:5409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba6dd84 r8:00000002 r7:60000013 r6:eba6dd8c r5:84e3a400 r4:84e3a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84701e00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a038c r4:856a0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a038c r4:85654380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e3a400 r8:856543ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654380 r8:80287e08 r7:eba39e60 r6:8565e780 r5:84e3a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba6dfb0 to 0xeba6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659d40 INFO: task kworker/1:617:5409 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 85532000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:5411 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:84e3b000 r4:84e3b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569ff8c r4:8569fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569ff8c r4:85654400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e3b000 r8:8565442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654400 r8:80287e08 r7:eba6de60 r6:8565e800 r5:84e3b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85659f40 INFO: task kworker/1:618:5411 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 85532000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:5414 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:5414 tgid:5414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba95d84 r8:00000002 r7:60000113 r6:eba95d8c r5:84e3d400 r4:84e3d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a1b8c r4:856a1800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a1b8c r4:85654480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e3d400 r8:856544ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654480 r8:80287e08 r7:eba6de60 r6:8565e880 r5:84e3d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651080 INFO: task kworker/1:619:5414 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 85be5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:5415 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:5415 tgid:5415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:84e3e000 r4:84e3e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a078c r4:856a0400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a078c r4:85654500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e3e000 r8:8565452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654500 r8:80287e08 r7:eba95e60 r6:8565e900 r5:84e3e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651080 INFO: task kworker/1:620:5415 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8608b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:5417 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:84e3c800 r4:84e3c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e3c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0b8c r4:856a0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a0b8c r4:85654580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e3c800 r8:856545ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654580 r8:80287e08 r7:eba95e60 r6:8565e980 r5:84e3c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651080 INFO: task kworker/1:621:5417 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8608b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:5419 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba5dd84 r8:00000002 r7:60000113 r6:eba5dd8c r5:855fec00 r4:855fec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855fec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaaf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0f8c r4:856a0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a0f8c r4:85654600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fec00 r8:8565462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654600 r8:80287e08 r7:eba95e60 r6:85654680 r5:855fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba5dfb0 to 0xeba5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651200 INFO: task kworker/1:622:5419 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 86524000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:5421 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaadd84 r8:00000002 r7:60000113 r6:ebaadd8c r5:855fe000 r4:855fe000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855fe000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856515c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a138c r4:856a1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a138c r4:85654700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fe000 r8:8565472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654700 r8:80287e08 r7:eba95e60 r6:85654780 r5:855fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651500 INFO: task kworker/1:623:5421 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 86524000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:5424 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e9d84 r8:00000002 r7:60000113 r6:eb5e9d8c r5:855f8c00 r4:855f8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88b1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a178c r4:856a1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a178c r4:85654800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f8c00 r8:8565482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654800 r8:80287e08 r7:eba95e60 r6:85654880 r5:855f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651640 INFO: task kworker/1:624:5424 is blocked on a mutex likely owned by task kworker/0:181:3662. [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:5428 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:5428 tgid:5428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:855fb000 r4:855fb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855fb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651b80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a1f8c r4:856a1c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a1f8c r4:85654900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fb000 r8:8565492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654900 r8:80287e08 r7:eba95e60 r6:85654980 r5:855fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651800 INFO: task kworker/1:625:5428 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:626 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855fc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651cc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf17000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a238c r4:856a2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a238c r4:85654a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fc800 r8:85654a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654a00 r8:80287e08 r7:ebab9e60 r6:85654a80 r5:855fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651c00 INFO: task kworker/1:626:5431 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87118000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:5433 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:5433 tgid:5433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb961d84 r8:00000002 r7:60000113 r6:eb961d8c r5:84ea1800 r4:84ea1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ea1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf65000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a278c r4:856a2400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a278c r4:85654b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea1800 r8:85654b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654b00 r8:80287e08 r7:eb6d5e60 r6:85654b80 r5:84ea1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651b40 INFO: task kworker/1:627:5433 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87118000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:5434 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:5434 tgid:5434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba7dd84 r8:00000002 r7:60000113 r6:eba7dd8c r5:84e4d400 r4:84e4d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e4d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85651440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb027000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a2b8c r4:856a2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a2b8c r4:85654c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4d400 r8:85654c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654c00 r8:80287e08 r7:eb961e60 r6:85654c80 r5:84e4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651b40 INFO: task kworker/1:628:5434 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8741b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:5436 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:84de1800 r4:84de1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567f040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84de1800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559d38c r4:8559d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559d38c r4:8565ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de1800 r8:8565ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ea00 r8:80287e08 r7:eb8b9e60 r6:8565ea80 r5:84de1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85660b40 INFO: task kworker/0:518:5436 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87607000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:629 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84de3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84de3000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a2f8c r4:856a2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a2f8c r4:85654d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de3000 r8:85654d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654d00 r8:80287e08 r7:eba7de60 r6:8565eb00 r5:84de3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855dfd40 INFO: task kworker/1:629:5438 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87b06000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5439 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad9d84 r8:00000002 r7:60000013 r6:ebad9d8c r5:84de0000 r4:84de0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84de0000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a378c r4:856a3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a378c r4:85654d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de0000 r8:85654dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654d80 r8:80287e08 r7:ebad5e60 r6:8565eb80 r5:84de0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651fc0 INFO: task kworker/1:630:5439 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87b06000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:5442 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/1:631 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84de2400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84701d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84de2400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb133000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a338c r4:856a3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a338c r4:85654e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de2400 r8:85654e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654e00 r8:80287e08 r7:ebad9e60 r6:8565ec00 r5:84de2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85651f80 INFO: task kworker/1:631:5442 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87e44000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:5443 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:632 state:D stack:0 pid:5443 tgid:5443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae9d84 r8:00000002 r7:60000013 r6:ebae9d8c r5:84de4800 r4:84de4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84de4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a838c r4:856a8000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a838c r4:85654e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de4800 r8:85654eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654e80 r8:80287e08 r7:ebad9e60 r6:8565ec80 r5:84de4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 87fb3000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:5444 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaedd84 r8:00000002 r7:60000013 r6:ebaedd8c r5:84de0c00 r4:84de0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84de0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a3b8c r4:856a3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a3b8c r4:85654f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de0c00 r8:85654f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654f00 r8:80287e08 r7:ebae9e60 r6:8565ed00 r5:84de0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaedfb0 to 0xebaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674040 INFO: task kworker/1:633:5444 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8828b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:5446 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:634 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000013 r6:ebac5d8c r5:855f6c00 r4:855f6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856742c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb235000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a3f8c r4:856a3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a3f8c r4:85654f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f6c00 r8:85654fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85654f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85654f80 r8:80287e08 r7:ebae9e60 r6:85675000 r5:855f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674200 INFO: task kworker/1:634:5446 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8828b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:85608000 r4:85608000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85608000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85608000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a878c r4:856a8400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a878c r4:85675080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85608000 r8:856750ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675080 r8:80287e08 r7:ebae9e60 r6:85675100 r5:85608000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf1fb0 to 0xebaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674240 INFO: task kworker/1:635:5449 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 886f1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85608c00 r5:85608c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674780 r9:83018205 r8:85608c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a8b8c r4:856a8800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a8b8c r4:85675180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85608c00 r8:856751ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675180 r8:80287e08 r7:ebaf1e60 r6:85675200 r5:85608c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac9fb0 to 0xebac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674540 INFO: task kworker/1:636:5451 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 889df000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:5452 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:5452 tgid:5452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:ebaf9d84 r8:00000002 r7:60000113 r6:ebaf9d8c r5:85609800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a8f8c r4:856a8c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a8f8c r4:85675280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85609800 r8:856752ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675280 r8:80287e08 r7:ebac9e60 r6:85675300 r5:85609800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674600 INFO: task kworker/1:637:5452 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 889df000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:5455 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000013 r6:ebb01d8c r5:84de5400 r4:84de5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a938c r4:856a9000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a938c r4:85675380 r10:61c88647 r9:84de5400 r8:856753ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85675380 r8:80287e08 r7:ebaf9e60 r6:8565ed80 r5:84de5400 1fa0: 00000000 00000000 00000000 00000000 r4:856747c0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 88e80000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:5456 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:5456 tgid:5456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:8560a400 r4:8560a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a978c r4:856a9400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a978c r4:85675400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560a400 r8:8567542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675400 r8:80287e08 r7:ebb01e60 r6:85675480 r5:8560a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb05fb0 to 0xebb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674600 INFO: task kworker/1:639:5456 is blocked on a mutex likely owned by task kworker/0:181:3662. [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe00a9d28 to 0xe00a9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84de3c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebafde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567f400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84de3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559db8c r4:8559d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559db8c r4:8565ee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de3c00 r8:8565ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ee00 r8:80287e08 r7:eb8b9e60 r6:8565ee80 r5:84de3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebafdfb0 to 0xebafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567f100 INFO: task kworker/0:519:5458 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 88e80000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:5461 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84de6c00 r4:84de6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85713000 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84de6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb889000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559e38c r4:8559e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559e38c r4:8565ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de6c00 r8:8565ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ef00 r8:80287e08 r7:ebafde60 r6:8565ef80 r5:84de6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567f200 INFO: task kworker/0:520:5461 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 89210000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:5462 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:5462 tgid:5462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb09d84 r8:00000002 r7:60000013 r6:ebb09d8c r5:84de6000 r4:84de6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84de6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84701f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84de6000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559ef8c r4:8559ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559ef8c r4:8567e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84de6000 r8:8567e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e000 r8:80287e08 r7:ebb0de60 r6:8567e080 r5:84de6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb09fb0 to 0xebb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567f200 INFO: task kworker/0:521:5462 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 89210000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:5465 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:84e3ec00 r4:84e3ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a9b8c r4:856a9800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e3ec00 r8:8567552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674cc0 INFO: task kworker/1:640:5465 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 896bc000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:5467 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:84e3bc00 r4:84e3bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e3bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a9f8c r4:856a9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a9f8c r4:85675580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e3bc00 r8:856755ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675580 r8:80287e08 r7:ebb15e60 r6:8567e180 r5:84e3bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674d00 INFO: task kworker/1:641:5467 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 896bc000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:5470 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb25d84 r8:00000002 r7:60000013 r6:ebb25d8c r5:85649800 r4:85649800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85649800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676400 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85649800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aa78c r4:856aa400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aa78c r4:85675600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85649800 r8:8567562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675600 r8:80287e08 r7:ebb19e60 r6:8567e200 r5:85649800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb25fb0 to 0xebb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856761c0 INFO: task kworker/1:642:5470 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 896bc000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:5471 blocked for more than 471 seconds. task:kworker/1:643 state:D stack:0 pid:5471 tgid:5471 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85648000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856aa38c r4:856aa000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85648000 r8:856756ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675680 r8:80287e08 r7:ebb25e60 r6:8567e280 r5:85648000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676100 INFO: task kworker/1:643:5471 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 89b65000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:5473 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:5473 tgid:5473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb2dd84 r8:00000002 r7:60000113 r6:ebb2dd8c r5:8564a400 r4:8564a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856765c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8564a400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aab8c r4:856aa800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aab8c r4:85675700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564a400 r8:8567572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675700 r8:80287e08 r7:ebb25e60 r6:8567e300 r5:8564a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676200 INFO: task kworker/1:644:5473 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 89df8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:5475 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000113 r6:ebb35d8c r5:8564bc00 r4:8564bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8564bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb857000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856acf8c r4:856acc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856acf8c r4:85675780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85675780 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:85676440 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:5476 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:8564c800 r4:8564c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8564c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aaf8c r4:856aac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aaf8c r4:85675800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564c800 r8:8567582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675800 r8:80287e08 r7:ebb35e60 r6:8567e400 r5:8564c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676440 INFO: task kworker/1:646:5476 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8a20e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:5479 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:8564b000 r4:8564b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8564b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb761000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ab38c r4:856ab000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ab38c r4:85675880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564b000 r8:856758ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675880 r8:80287e08 r7:ebb35e60 r6:8567e480 r5:8564b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676540 INFO: task kworker/1:647:5479 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8a20e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:648:5480 blocked for more than 471 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb49d84 r8:00000002 r7:60000013 r6:ebb49d8c r5:8564ec00 r4:8564ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8564ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ab78c r4:856ab400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ab78c r4:85675900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564ec00 r8:8567592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675900 r8:80287e08 r7:ebb35e60 r6:8567e500 r5:8564ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676640 INFO: task kworker/1:648:5480 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8a840000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:5482 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:8564d400 r4:8564d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676ac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8564d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856abb8c r4:856ab800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856abb8c r4:85675980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564d400 r8:856759ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675980 r8:80287e08 r7:ebb35e60 r6:8567e580 r5:8564d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676800 INFO: task kworker/1:649:5482 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8a840000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:650:5485 blocked for more than 471 seconds. [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eb807000 r5:856abf8c r4:856abc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847d8c00 r8:85675a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676940 INFO: task kworker/1:650:5485 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8aab6000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:5486 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb21d84 r8:00000002 r7:60000013 r6:ebb21d8c r5:8560c800 r4:8560c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb813000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ac38c r4:856ac000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ac38c r4:85675a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560c800 r8:85675aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675a80 r8:80287e08 r7:ebb35e60 r6:85675b00 r5:8560c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676a80 INFO: task kworker/1:651:5486 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8abfc000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:5488 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb61d84 r8:00000002 r7:60000013 r6:ebb61d8c r5:8560d400 r4:8560d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb825000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ac78c r4:856ac400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ac78c r4:85675b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560d400 r8:85675bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675b80 r8:80287e08 r7:ebb35e60 r6:85675c00 r5:8560d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676bc0 INFO: task kworker/1:652:5488 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b038000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:5491 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:5491 tgid:5491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb65d84 r8:00000002 r7:60000013 r6:ebb65d8c r5:8560e000 r4:8560e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560e000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb845000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856acb8c r4:856ac800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856acb8c r4:85675c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560e000 r8:85675cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675c80 r8:80287e08 r7:ebb35e60 r6:85675d00 r5:8560e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85674b40 INFO: task kworker/1:653:5491 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b038000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:5493 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:8560ec00 r4:8560ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb867000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ad38c r4:856ad000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ad38c r4:85675d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560ec00 r8:85675dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675d80 r8:80287e08 r7:ebb35e60 r6:85675e00 r5:8560ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f000 INFO: task kworker/1:654:5493 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b251000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:5495 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb6dd84 r8:00000002 r7:60000113 r6:ebb6dd8c r5:8560bc00 r4:8560bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ad78c r4:856ad400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ad78c r4:85675e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560bc00 r8:85675eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675e80 r8:80287e08 r7:ebb69e60 r6:85675f00 r5:8560bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb6dfb0 to 0xebb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f240 INFO: task kworker/1:655:5495 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b676000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:5497 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000013 r6:ebb71d8c r5:8560b000 r4:8560b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb909000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856adb8c r4:856ad800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856adb8c r4:85675f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560b000 r8:85675fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85675f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85675f80 r8:80287e08 r7:ebb6de60 r6:85709000 r5:8560b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f440 INFO: task kworker/1:656:5497 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b94e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:657:5499 blocked for more than 471 seconds. task:kworker/1:657 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb75d84 r8:00000002 r7:60000013 r6:ebb75d8c r5:85610000 r4:85610000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85610000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f7c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85610000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb85000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ae38c r4:856ae000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ae38c r4:85709080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85610000 r8:857090ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709080 r8:80287e08 r7:ebb71e60 r6:85709100 r5:85610000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f280 INFO: task kworker/1:657:5499 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b94e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:658:5501 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:658 state:D stack:0 pid:5501 tgid:5501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb7dd84 r8:00000002 r7:60000013 r6:ebb7dd8c r5:85610c00 r4:85610c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85610c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb7de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85610c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb79000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856adf8c r4:856adc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856adf8c r4:85709180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85610c00 r8:857091ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709180 r8:80287e08 r7:ebb75e60 r6:85709200 r5:85610c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f440 INFO: task kworker/1:658:5501 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8b94e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:659:5503 blocked for more than 471 seconds. [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568fc80 r5:856aef8c r4:856aec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aef8c r4:85709280 r4:85709280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:659:5503 is blocked on a mutex likely owned by task kworker/0:181:3662. r4:00000000 9d20: 8b94e000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:5505 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:85613000 r4:85613000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85613000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ae78c r4:856ae400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ae78c r4:85709380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85613000 r8:857093ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709380 r8:80287e08 r7:ebb1de60 r6:85709400 r5:85613000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb89d84 r8:00000002 r7:60000013 r6:ebb89d8c r5:85613c00 r4:85613c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85613c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb89e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568fb80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85613c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aeb8c r4:856ae800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aeb8c r4:85709480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85613c00 r8:857094ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709480 r8:80287e08 r7:ebb1de60 r6:85709500 r5:85613c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb89fb0 to 0xebb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568fa80 INFO: task kworker/1:661:5508 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8c226000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:5510 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:662 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:85614800 r4:85614800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85614800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568fdc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85614800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856af38c r4:856af000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856af38c r4:85709580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85614800 r8:857095ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709580 r8:80287e08 r7:ebb1de60 r6:85709600 r5:85614800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568fa80 INFO: task kworker/1:662:5510 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: 8c226000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:85615400 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856af78c r4:856af400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856af78c r4:85709680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85615400 r8:857096ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709680 r8:80287e08 r7:ebba9e60 r6:85709700 r5:85615400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568fc40 INFO: task kworker/1:663:5512 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8c226000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:5513 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85616000 r4:85616000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85616000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571d100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85616000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aff8c r4:856afc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aff8c r4:85709780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85616000 r8:857097ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709780 r10:00000000 r9:85709780 r8:80287e08 r7:ebbc1e60 r6:85709800 r5:85616000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb5fb0 to 0xebbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568fe00 INFO: task kworker/1:664:5513 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8c66a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:5515 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:5515 tgid:5515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd1d84 r8:00000002 r7:60000113 r6:ebbd1d8c r5:85616c00 r4:85616c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85616c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85660c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85616c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbcd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856afb8c r4:856af800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856afb8c r4:85709880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85616c00 r8:857098ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709880 r8:80287e08 r7:ebbb5e60 r6:85709900 r5:85616c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd1fb0 to 0xebbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571d040 INFO: task kworker/1:665:5515 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8c66a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:5517 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85611800 r4:85611800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85611800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571d380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85611800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc09000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b838c r4:856b8000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b838c r4:85709980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85611800 r8:857099ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709980 r8:80287e08 r7:ebbb5e60 r6:85709a00 r5:85611800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbddfb0 to 0xebbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571d040 INFO: task kworker/1:666:5517 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8c947000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:5520 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc0dd84 r8:00000002 r7:60000113 r6:ebc0dd8c r5:85780000 r4:85780000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85780000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571d4c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85780000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc15000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b878c r4:856b8400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b878c r4:85709a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780000 r8:85709aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709a80 r8:80287e08 r7:ebbdde60 r6:85709b00 r5:85780000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571d400 INFO: task kworker/1:667:5520 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8cd4b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:5521 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc25d84 r8:00000002 r7:60000113 r6:ebc25d8c r5:85780c00 r4:85780c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85780c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571d640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85780c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc21000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b8b8c r4:856b8800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b8b8c r4:85709b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780c00 r8:85709bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709b80 r8:80287e08 r7:ebc0de60 r6:85709c00 r5:85780c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571d340 INFO: task kworker/1:668:5521 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8cd4b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85782400 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856b8f8c r4:856b8c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85709c80 r8:80287e08 r7:ebc25e60 r6:85709d00 r5:85782400 INFO: task kworker/1:669:5524 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 8d076000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:5525 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc41d84 r8:00000002 r7:60000013 r6:ebc41d8c r5:85783000 r4:85783000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85783000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571da80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85783000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b938c r4:856b9000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b938c r4:85709d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85783000 r8:85709dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709d80 r8:80287e08 r7:ebc19e60 r6:8567e680 r5:85783000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc41fb0 to 0xebc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571d5c0 INFO: task kworker/1:670:5525 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856b978c r4:856b9400 r10:61c88647 r9:847d9800 r8:85709e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709e00 r8:80287e08 r7:ebc41e60 r6:8567e700 r5:847d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571d900 INFO: task kworker/1:671:5527 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8d4ee000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:672:5529 blocked for more than 472 seconds. r4:847dc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847dc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc6de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571dc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b9b8c r4:856b9800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b9b8c r4:85709e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847dc800 r8:85709eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709e80 r8:80287e08 r7:ebc59e60 r6:8567e780 r5:847dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc6dfb0 to 0xebc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ddc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc69000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b9f8c r4:856b9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b9f8c r4:85709f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85783c00 r8:85709f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85709f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85709f00 r8:80287e08 r7:ebc6de60 r6:85709f80 r5:85783c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc35fb0 to 0xebc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571db00 INFO: task kworker/1:673:5531 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8d7f8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85784800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856ba38c r4:856ba000 r10:61c88647 r9:85784800 r8:8572a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xebc55fb0 to 0xebc55ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85785400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 r5:856ba78c r4:856ba400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:675:5535 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8da65000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:5536 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc71d84 r8:00000002 r7:60000113 r6:ebc71d8c r5:85786000 r4:85786000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85786000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc71e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572f300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85786000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856bab8c r4:856ba800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856bab8c r4:8572a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786000 r8:8572a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572a200 r8:80287e08 r7:ebc81e60 r6:8572a280 r5:85786000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc71fb0 to 0xebc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572f080 INFO: task kworker/1:676:5536 is blocked on a mutex likely owned by task kworker/0:181:3662. r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85786c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85786c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85733200 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85786c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec571000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856bbf8c r4:856bbc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856bbf8c r4:8572a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786c00 r8:8572a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572a300 r8:80287e08 r7:ebc71e60 r6:8572a380 r5:85786c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc8dfb0 to 0xebc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572f500 INFO: task kworker/1:677:5543 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8de2f000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc9de08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856baf8c r4:856bac00 r10:61c88647 r9:85781800 r8:8572a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r4:e00a9dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Not tainted 6.15.0-rc5-syzkaller #0 r5:85788000 r4:8291a680 r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856bb38c r4:856bb000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856bb38c r4:8572a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85788000 r8:8572a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572a500 r8:80287e08 r7:ebc8de60 r6:8572a580 r5:85788000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572f500 INFO: task kworker/1:679:5546 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8e2dd000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:5547 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:85788c00 r4:85788c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85788c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572f600 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead55000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856bb78c r4:856bb400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856bb78c r4:8572a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85788c00 r8:8572a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572a600 r8:80287e08 r7:ebc8de60 r6:8572a680 r5:85788c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572f500 INFO: task kworker/1:680:5547 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) r5:800e0113 r4:80239bb0 r4:e00a9dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85789800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:856bbb8c r4:856bb800 r10:61c88647 r9:85789800 r8:8572a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:5550 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:8578a400 r4:8578a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570bc80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8578a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b878c r4:857b8400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857b878c r4:8572a800 r4:8572a800 Exception stack(0xeba11fb0 to 0xeba11ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/0:522:5552 blocked for more than 472 seconds. r5:8578b000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8559e78c r4:8567e800 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:5553 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba35d84 r8:00000002 r7:60000013 r6:eba35d8c r5:8578bc00 r4:8578bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85713d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8578bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559eb8c r4:8559e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559eb8c r4:8567e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578bc00 r8:8567e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e880 r8:80287e08 r7:ebb09e60 r6:8572a980 r5:8578bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85713ec0 INFO: task kworker/0:523:5553 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8eba0000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/0:524:5556 blocked for more than 472 seconds. r5:8578c800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8559f38c r4:8567e900 r10:00000000 r9:8567e900 r8:80287e08 r7:ebb09e60 r6:8572aa00 r5:8578c800 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800e0113 r4:80239bb0 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:5557 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba69d84 r8:00000002 r7:60000113 r6:eba69d8c r5:8578d400 r4:8578d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573f280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8578d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559f78c r4:8559f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559f78c r4:8567e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578d400 r8:8567e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e980 r8:80287e08 r7:eba59e60 r6:8572aa80 r5:8578d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85713040 INFO: task kworker/0:525:5557 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8f006000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:800e0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8559ff8c r4:8559fc00 r10:00000000 r9:8567ea00 r8:80287e08 r7:eba69e60 r6:8572ab00 r5:8578e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 r5:00001000 r4:e0065000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85790c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573f3c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85790c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba45000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559fb8c r4:8559f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559fb8c r4:8567ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85790c00 r8:8567eaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ea80 r8:80287e08 r7:eba91e60 r6:8572ab80 r5:85790c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8573f100 INFO: task kworker/0:527:5562 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8f4ce000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:528:5563 blocked for more than 472 seconds. r4:85791800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84ec9f8c r4:84ec9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8567eb00 r8:80287e08 r7:eba91e60 r6:8572ac00 r5:85791800 INFO: task kworker/0:528:5563 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 8f4ce000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85790000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85790000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573f800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85790000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ec9b8c r4:84ec9800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ec9b8c r4:8567eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85790000 r8:8567ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567eb80 r8:80287e08 r7:ebac1e60 r6:8572ac80 r5:85790000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca5fb0 to 0xebca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8573f400 INFO: task kworker/0:529:5565 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8f4ce000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85792400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 r9:83018005 r8:85792400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebcadfb0 to 0xebcadff8) INFO: task kworker/0:530:5567 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 8f851000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:5569 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:5569 tgid:5569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856dc38c r4:856dc000 r7:dddced80 r6:83018000 r5:856dc38c r4:8567ec80 r10:00000000 r9:8567ec80 r8:80287e08 r7:ebcade60 r6:8567ed00 r5:847dd400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8fb46000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:5571 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:847db000 r4:847db000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847db000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856dc78c r4:856dc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: 8fdfa000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/0:533:5574 blocked for more than 472 seconds. [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573fbc0 r5:856dcb8c r4:856dc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85793c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r5:856dcf8c r4:856dcc00 r10:61c88647 r9:85793c00 r8:8567efac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 8fdfa000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:5578 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:5578 tgid:5578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcf9d84 r8:00000002 r7:60000113 r6:ebcf9d8c r5:85793000 r4:85793000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85793000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85793000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec525000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856de38c r4:856de000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856de38c r4:85728000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85793000 r8:8572802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728000 r8:80287e08 r7:ebcade60 r6:8572ae00 r5:85793000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred r4:85794800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r9:83018005 r8:85794800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r5:856dd78c r4:856dd400 r10:61c88647 r9:85794800 r8:857280ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:5581 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec515d84 r8:00000002 r7:60000013 r6:ec515d8c r5:85796c00 r4:85796c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85796c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec515e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572ff40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85796c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ddb8c r4:856dd800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ddb8c r4:85728100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85796c00 r8:8572812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728100 r8:80287e08 r7:ebcf9e60 r6:8572af00 r5:85796c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec515fb0 to 0xec515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8573fe40 INFO: task kworker/0:537:5581 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 90669000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 task:kworker/0:538 state:D stack:0 pid:5583 tgid:5583 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:856ddf8c r4:856ddc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85728180 r8:80287e08 r7:ebcf9e60 r6:85728200 r5:847dec00 INFO: task kworker/0:538:5583 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:5587 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec51dd84 r8:00000002 r7:60000113 r6:ec51dd8c r5:847dbc00 r4:847dbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847dbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec531000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856de78c r4:856de400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856de78c r4:85728280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847dbc00 r8:857282ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728280 r8:80287e08 r7:ebcf9e60 r6:85728300 r5:847dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec51dfb0 to 0xec51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857201c0 INFO: task kworker/0:539:5587 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 908cd000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Not tainted 6.15.0-rc5-syzkaller #0 r4:847da400 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856def8c r4:856dec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec529fb0 to 0xec529ff8) INFO: task kworker/0:540:5588 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 90cf2000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720500 r5:856deb8c r4:856de800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847d8000 r8:857284ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8564e000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec57d000 r5:856dfb8c r4:856df800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:542:5592 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:5593 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec565d84 r8:00000002 r7:60000013 r6:ec565d8c r5:85795400 r4:85795400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85795400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec565e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85795400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec555000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856df38c r4:856df000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856df38c r4:85728680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85795400 r8:857286ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728680 r8:80287e08 r7:ec541e60 r6:8572af80 r5:85795400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec565fb0 to 0xec565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857204c0 INFO: task kworker/0:543:5593 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9120b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:5595 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:856df78c r4:856df400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85728700 Exception stack(0xec575fb0 to 0xec575ff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:5599 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec559d84 r8:00000002 r7:60000113 r6:ec559d8c r5:85798000 r4:85798000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85798000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85798000 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec585000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856dff8c r4:856dfc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856dff8c r4:85728780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:85799800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857b838c r4:857b8000 r10:61c88647 r9:85799800 r8:8565a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec595fb0 to 0xec595ff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ec58d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e038c r4:856e0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e038c r4:85728800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579a400 r8:8572882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728800 r8:80287e08 r7:ec559e60 r6:8565a200 r5:8579a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec599fb0 to 0xec599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85720a00 INFO: task kworker/0:546:5602 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 92058000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:5604 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5a9d84 r8:00000002 r7:60000013 r6:ec5a9d8c r5:85798c00 r4:85798c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85798c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568b0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85798c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856e178c r4:856e1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e178c r4:85728880 r10:61c88647 r9:85798c00 r8:857288ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r5:800e0113 r4:80239bb0 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720e80 r5:856e078c r4:856e0400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e078c r4:85728900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579bc00 r8:8572892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728900 r8:80287e08 r7:ec5a9e60 r6:8565a300 r5:8579bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85720a80 INFO: task kworker/0:548:5605 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 924e1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:5607 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d1d84 r8:00000002 r7:60000113 r6:ec5d1d8c r5:8579b000 r4:8579b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579b000 r4:8291a680 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e0b8c r4:856e0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85728980 r8:80287e08 r7:ec5a9e60 r6:8565a380 r5:8579b000 INFO: task kworker/0:549:5607 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e0f8c r4:856e0c00 r10:61c88647 r9:8579c800 r8:85728a2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:550:5610 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85648c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec569e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720f40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85648c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5dd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e138c r4:856e1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e138c r4:85728a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85648c00 r8:85728aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728a80 r8:80287e08 r7:ec5a9e60 r6:85728b00 r5:85648c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec569fb0 to 0xec569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85720ec0 INFO: task kworker/0:551:5611 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9297f000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:5614 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec54de08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e1b8c r4:856e1800 r10:61c88647 r9:84ef0c00 r8:85728bac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r4:e00a9dc0 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84ef1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f9e08 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:553:5616 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:5618 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec615d84 r8:00000002 r7:60000113 r6:ec615d8c r5:8579e000 r4:8579e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8579e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c638c r4:857c6000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c638c r4:85728d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579e000 r8:85728dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728d80 r8:80287e08 r7:ec5f9e60 r6:8565a480 r5:8579e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec615fb0 to 0xec615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568b380 INFO: task kworker/0:554:5618 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 92fb8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:684:5622 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:684 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:8579d400 r4:8579d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857b8b8c r4:857b8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) INFO: task kworker/1:684:5622 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857b978c r4:857b9400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8579ec00 r8:8565a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 93435000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:5626 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:857a0000 r4:857a0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85732680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb701000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e278c r4:856e2400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e278c r4:85728e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a0000 r8:85728e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85728e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85728e00 r8:80287e08 r7:ec5f9e60 r6:8565a700 r5:857a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568b540 INFO: task kworker/0:555:5626 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 93435000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85732780 r5:856e2b8c r4:856e2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85728e80 Exception stack(0xebb3dfb0 to 0xebb3dff8) INFO: task kworker/0:556:5628 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 93435000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r5:84ca2f8c r4:84ca2c00 r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:857a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:857b8f8c r4:857b8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8565a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565a800 r8:80287e08 r7:ec5ede60 r6:8565a880 r5:857a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb55fb0 to 0xebb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570bd40 INFO: task kworker/1:686:5629 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 93b26000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:5630 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 r4:00000000 r5:857b938c r4:857b9000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857b938c r4:8565a900 r4:8565a900 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:688:5634 blocked for more than 473 seconds. r4:857a3000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857b9b8c r4:857b9800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8565aa00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 93b26000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857b9f8c r4:857b9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857b9f8c r4:8565ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a3c00 r8:8565ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ab00 r8:80287e08 r7:ebc61e60 r6:8565ab80 r5:857a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568e100 INFO: task kworker/1:689:5635 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 93f4c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:690:5638 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:857a4800 r4:857a4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568e5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ba38c r4:857ba000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ba38c r4:8565ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a4800 r8:8565ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ac00 r8:80287e08 r7:ec62de60 r6:8565ac80 r5:857a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec631fb0 to 0xec631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568e440 INFO: task kworker/1:690:5638 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:691 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 r5:857bab8c r4:857ba800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857a5400 r8:8565ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:5641 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:857a6000 r4:857a6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568e700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ba78c r4:857ba400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ba78c r4:8565ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a6000 r8:8565ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ae00 r8:80287e08 r7:ec639e60 r6:8565ae80 r5:857a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568e640 INFO: task kworker/1:692:5641 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) r5:800e0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ef0000 r4:8291a680 r4:00000000 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857baf8c r4:857bac00 r10:61c88647 r9:84ef0000 r8:8565af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:694:5646 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:694 state:D stack:0 pid:5646 tgid:5646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec651d84 r8:00000002 r7:60000113 r6:ec651d8c r5:84ef3c00 r4:84ef3c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ef3c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568eb40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ef3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb385000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857bb38c r4:857bb000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857bb38c r4:8565af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ef3c00 r8:8565afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565af80 r8:80287e08 r7:ec649e60 r6:85728f80 r5:84ef3c00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e4c0 r5:857c178c r4:857c1400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8571b000 r8:80287e08 r7:ec651e60 r6:85722000 r5:84ef3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:695:5647 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 94b69000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:5649 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec65dd84 r8:00000002 r7:60000113 r6:ec65dd8c r5:84ef6000 r4:84ef6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ef6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568ecc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ef6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:857bb78c r4:857bb400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:697:5650 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:697 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec661d84 r8:00000002 r7:60000113 r6:ec661d8c r5:84ef6c00 r4:84ef6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ef6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568ee80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ef6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4dd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857bbb8c r4:857bb800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857bbb8c r4:8571b100 r10:61c88647 r9:84ef6c00 r8:8571b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:5653 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec66dd84 r8:00000002 r7:60000113 r6:ec66dd8c r5:84ef5400 r4:84ef5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ef5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568ef80 r4:00000000 r9:83018205 r8:84ef5400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:857bbf8c r4:857bbc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ef5400 r8:8571b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8578ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570b800 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8578ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c038c r4:857c0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c038c r4:8571b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578ec00 r8:8571b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b200 r8:80287e08 r7:ec655e60 r6:85722200 r5:8578ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84d69800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:857c078c r4:857c0400 r10:61c88647 r9:84d69800 r8:8571b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec67dfb0 to 0xec67dff8) INFO: task kworker/1:700:5657 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568ed80 r5:857c0b8c r4:857c0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8571b300 r8:80287e08 r7:ec655e60 r6:85722300 r5:84d68000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568efc0 INFO: task kworker/1:701:5658 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 95622000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5659 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec685d84 r8:00000002 r7:60000113 r6:ec685d8c r5:84d6a400 r4:84d6a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d6a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e100 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c0f8c r4:857c0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c0f8c r4:8571b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d6a400 r8:8571b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b380 r8:80287e08 r7:ec655e60 r6:85722380 r5:84d6a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec685fb0 to 0xec685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568b900 INFO: task kworker/1:702:5659 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r5:800e0113 r4:80239bb0 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84d6b000 r4:8291a680 r4:00000000 r4:00000000 r5:857d138c r4:857d1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d6b000 r8:8572242c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:5665 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec641d84 r8:00000002 r7:60000113 r6:ec641d8c r5:84d6bc00 r4:84d6bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d6bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85732ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb77000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e2f8c r4:856e2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e2f8c r4:85722500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d6bc00 r8:8572252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85722500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85722500 r8:80287e08 r7:ec63de60 r6:85722580 r5:84d6bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85732580 INFO: task kworker/0:558:5665 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 95b12000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857c138c r4:857c1000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d6c800 r8:8571b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:82ac21e4 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec68dd84 r8:00000002 r7:60000113 r6:ec68dd8c r5:84d6d400 r4:84d6d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d6d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c1b8c r4:857c1800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c1b8c r4:8571b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d6d400 r8:8571b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b480 r8:80287e08 r7:ec655e60 r6:85722680 r5:84d6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572e200 INFO: task kworker/1:704:5668 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9654e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:5670 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec69de08 r9:83018205 r8:84d6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:857c1f8c r4:857c1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:705:5670 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 9654e000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:706 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857c2b8c r4:857c2800 r10:61c88647 r9:84ef2400 r8:8571b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5674 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6add84 r8:00000002 r7:60000113 r6:ec6add8c r5:84ef4800 r4:84ef4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ef4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ef4800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb863000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c238c r4:857c2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c238c r4:8571b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ef4800 r8:8571b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b600 r8:80287e08 r7:ec6a9e60 r6:85722800 r5:84ef4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572e780 INFO: task kworker/1:707:5674 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9654e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6bde08 r5:00001000 r4:eb8d7000 r5:857c278c r4:857c2400 r10:61c88647 r9:84d68c00 r8:8571b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572ef00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85760c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c378c r4:857c3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c378c r4:8571b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760c00 r8:8571b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b700 r8:80287e08 r7:ec6a9e60 r6:85722900 r5:85760c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f1fb0 to 0xec6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572e880 INFO: task kworker/1:709:5678 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9695e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:5680 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f9d84 r8:00000002 r7:60000013 r6:ec6f9d8c r5:85762400 r4:85762400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85762400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572ec40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85762400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857c2f8c r4:857c2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8571b780 r10:00000000 r9:8571b780 r8:80287e08 r7:ec6f1e60 r6:85722980 r5:85762400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r5:800e0113 r4:80239bb0 r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5682 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5682 tgid:5682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6fdd84 r8:00000002 r7:60000113 r6:ec6fdd8c r5:85760000 r4:85760000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6fde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572ee40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c338c r4:857c3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c338c r4:8571b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760000 r8:8571b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b800 r8:80287e08 r7:ec6f1e60 r6:85722a00 r5:85760000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572edc0 INFO: task kworker/1:711:5682 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 96e6c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:85763000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c3f8c r4:857c3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85763000 r8:8571b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:713:5686 blocked for more than 473 seconds. r5:857aa400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572efc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb8b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c3b8c r4:857c3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c3b8c r4:8571b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aa400 r8:8571b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571b900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b900 r8:80287e08 r7:ec701e60 r6:8571b980 r5:857aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572eb40 INFO: task kworker/1:713:5686 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 97294000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857c538c r4:857c5000 r10:61c88647 r9:857ab000 r8:8571ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:714:5689 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 977bc000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:857abc00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c438c r4:857c4000 r7:ddde2d80 r6:83018200 r5:857c438c r4:8571bb00 r4:8571bb00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736480 r5:857c478c r4:857c4400 r7:ddde2d80 r6:83018200 r5:857c478c r4:8571bc00 r10:61c88647 r9:857ac800 r8:8571bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bc00 r8:80287e08 r7:eb9ade60 r6:8571bc80 r5:857ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85736100 INFO: task kworker/1:716:5693 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 977bc000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:5696 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:857ad400 r4:857ad400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ad400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae09000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c4b8c r4:857c4800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c4b8c r4:8571bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ad400 r8:8571bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bd00 r8:80287e08 r7:eb9ade60 r6:8571bd80 r5:857ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:717:5696 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:857ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:857c4f8c r4:857c4c00 r10:61c88647 r9:857ae000 r8:8571be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85736440 INFO: task kworker/1:718:5697 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 97c5d000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:5700 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:857aec00 r4:857aec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857aec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c578c r4:857c5400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c578c r4:8571bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aec00 r8:8571bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bf00 r8:80287e08 r7:eb9ade60 r6:8571bf80 r5:857aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5702 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa9d84 r8:00000002 r7:60000113 r6:ebaa9d8c r5:857a9800 r4:857a9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:857c5b8c r4:857c5800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c5b8c r4:857f6000 r10:61c88647 r9:857a9800 r8:857f602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:857a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:857c5f8c r4:857c5c00 r7:ddde2d80 r6:83018200 r5:857c5f8c r4:857f6100 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9848e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:722:5706 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:722 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc91d84 r8:00000002 r7:60000113 r6:ebc91d8c r5:857a8c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba65000 r5:857c6b8c r4:857c6800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857a8c00 r8:857f622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:723 state:D stack:0 pid:5707 tgid:5707 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:857a6c00 r5:857a6c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:857c678c r4:857c6400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c678c r4:857f6300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: 9d20: 9848e000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:5711 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebccdd84 r8:00000002 r7:60000113 r6:ebccdd8c r5:85830000 r4:85830000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85830000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85830000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c738c r4:857c7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c738c r4:857f6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85830000 r8:857f642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6400 r8:80287e08 r7:ebc91e60 r6:857f6480 r5:85830000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebccdfb0 to 0xebccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572ee80 INFO: task kworker/1:724:5711 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 98ba1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:5712 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:725 state:D stack:0 pid:5712 tgid:5712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcddd84 r8:00000002 r7:60000113 r6:ebcddd8c r5:85830c00 r4:85830c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r5:00001000 r4:ebaa5000 r5:857c6f8c r4:857c6c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85830c00 r8:857f652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85766c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:84eca78c r4:84eca400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:5716 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:5716 tgid:5716 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85764800 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebbad000 r5:857c778c r4:857c7400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c778c r4:857f6600 r4:857f6600 Exception stack(0xec591fb0 to 0xec591ff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:5718 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:85765400 r4:85765400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85765400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:857d178c r4:857d1400 r10:61c88647 r9:85765400 r8:857f66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: 994f8000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:728:5719 blocked for more than 473 seconds. [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800240 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85766000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c7b8c r4:857c7800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c7b8c r4:857f6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766000 r8:857f672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6700 r8:80287e08 r7:ec5b9e60 r6:85722d00 r5:85766000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d5fb0 to 0xec5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800500 INFO: task kworker/1:728:5719 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 994f8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e00a9dc0 r4:00000000 r5:00001000 r4:e0065000 r5:84ca2f8c r4:84ca2c00 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:729:5721 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r5:85761800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800700 r9:83018205 r8:85761800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:857c7f8c r4:857c7c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85761800 r8:857f67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec705fb0 to 0xec705ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800340 INFO: task kworker/1:729:5721 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 994f8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:5723 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:5723 tgid:5723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec70dd84 r8:00000002 r7:60000113 r6:ec70dd8c r5:84d6ec00 r4:84d6ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d6ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d038c r4:857d0000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d038c r4:857f6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d6ec00 r8:857f682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6800 r8:80287e08 r7:ec5b9e60 r6:85722e00 r5:84d6ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec70dfb0 to 0xec70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800680 INFO: task kworker/1:730:5723 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 994f8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:731:5725 blocked for more than 473 seconds. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857d078c r4:857d0400 r10:61c88647 r9:85028c00 r8:857f68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:5727 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec71dd84 r8:00000002 r7:60000013 r6:ec71dd8c r5:85028000 r4:85028000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85028000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85028000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc2b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d0b8c r4:857d0800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d0b8c r4:857f6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85028000 r8:857f692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6900 r8:80287e08 r7:ec5b9e60 r6:85722f00 r5:85028000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858006c0 INFO: task kworker/1:732:5727 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 99d6b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85029800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d0f8c r4:857d0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d0f8c r4:857f6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85029800 r8:857f69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6980 r8:80287e08 r7:ec5b9e60 r6:85722f80 r5:85029800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800900 INFO: task kworker/1:733:5729 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 99d6b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:734:5731 blocked for more than 473 seconds. r5:8502b000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857d1b8c r4:857d1800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8502b000 r8:857f6a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:5734 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:5734 tgid:5734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b1d84 r8:00000002 r7:60000113 r6:ec5b1d8c r5:8502bc00 r4:8502bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8502bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e378c r4:856e3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e378c r4:85814080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502bc00 r8:858140ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8502c800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1e40 r5:856e1f8c r4:856e1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec72dfb0 to 0xec72dff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:5738 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec731d84 r8:00000002 r7:60000113 r6:ec731d8c r5:8502d400 r4:8502d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8502d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d1f8c r4:857d1c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d1f8c r4:857f6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502d400 r8:857f6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6b00 r8:80287e08 r7:ec72de60 r6:85814200 r5:8502d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec731fb0 to 0xec731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:736:5738 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: 9a5b3000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8502ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:00001000 r4:ebcaf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d238c r4:857d2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d238c r4:857f6b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502ec00 r8:857f6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6b80 r8:80287e08 r7:ec731e60 r6:85814280 r5:8502ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec739fb0 to 0xec739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580c1c0 INFO: task kworker/1:737:5740 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9a83e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec741e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d278c r4:857d2400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d278c r4:857f6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502e000 r8:857f6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6c00 r8:80287e08 r7:ec739e60 r6:85814300 r5:8502e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec741fb0 to 0xec741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580c100 INFO: task kworker/1:738:5742 is blocked on a mutex likely owned by task kworker/0:181:3662. Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:739:5744 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:5744 tgid:5744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec749d84 r8:00000002 r7:60000113 r6:ec749d8c r5:857b0000 r4:857b0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ce40 r5:857d478c r4:857d4400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc3840 Workqueue: events bpf_prog_free_deferred r4:857b0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2b8c r4:857d2800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d2b8c r4:857f6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b0c00 r8:857f6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6d00 r8:80287e08 r7:ec749e60 r6:85814400 r5:857b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580c440 INFO: task kworker/1:740:5745 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r4:e00a9dc0 r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:857b2400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857d2f8c r4:857d2c00 r7:ddde2d80 r6:83018200 r5:857d2f8c r4:857f6d80 r10:00000000 r9:857f6d80 r8:80287e08 r7:ec749e60 r6:85814480 r5:857b2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5749 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000113 r6:ec75dd8c r5:857b1800 r4:857b1800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b1800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c7c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec523000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d338c r4:857d3000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d338c r4:857f6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b1800 r8:857f6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6e00 r8:80287e08 r7:ec749e60 r6:85814500 r5:857b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec75dfb0 to 0xec75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580c700 INFO: task kworker/1:742:5749 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9b2bf000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:857b3000 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857d378c r4:857d3400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857f6e80 Exception stack(0xec769fb0 to 0xec769ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580c840 INFO: task kworker/1:743:5752 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9b695000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5754 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d3b8c r4:857d3800 r7:ddde2d80 r6:83018200 r5:857d3b8c r4:857f6f00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:e00a9dc0 r5:84ca2f8c r4:84ca2c00 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5755 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5755 tgid:5755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec775d84 r8:00000002 r7:60000013 r6:ec775d8c r5:857b4800 r4:857b4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580cbc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec553000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d3f8c r4:857d3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d3f8c r4:857f6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b4800 r8:857f6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6f80 r8:80287e08 r7:ec749e60 r6:85814680 r5:857b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580c880 INFO: task kworker/1:745:5755 is blocked on a mutex likely owned by task kworker/0:181:3662. Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec721d84 r8:00000002 r7:60000113 r6:ec721d8c r5:85833000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d438c r4:857d4000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d438c r4:85822000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85833000 r8:8582202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822000 r8:80287e08 r7:ec749e60 r6:85822080 r5:85833000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec721fb0 to 0xec721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ca40 INFO: task kworker/1:746:5757 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9bb05000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581e3c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85832400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf23000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d5b8c r4:857d5800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d5b8c r4:85822100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85832400 r8:8582212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822100 r8:80287e08 r7:ec749e60 r6:85822180 r5:85832400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec77dfb0 to 0xec77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580cdc0 INFO: task kworker/1:747:5759 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9c411000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85834800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec583000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d4b8c r4:857d4800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d4b8c r4:85822200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85834800 r8:8582222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822200 r8:80287e08 r7:ec77de60 r6:85822280 r5:85834800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800f40 INFO: task kworker/1:748:5762 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9c411000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ec669d84 r8:00000002 r7:60000113 r6:ec669d8c r5:85835400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 r9:83018205 r8:85835400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 r5:857d4f8c r4:857d4c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85835400 r8:8582232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581e100 INFO: task kworker/1:749:5764 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9c411000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5766 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c1d84 r8:00000002 r7:60000013 r6:ec6c1d8c r5:857b6000 r4:857b6000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b6000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857d538c r4:857d5000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r4:857b6c00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec781e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581e540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac41000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d578c r4:857d5400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d578c r4:85822480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b6c00 r8:858224ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822480 r8:80287e08 r7:ec77de60 r6:85814780 r5:857b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec781fb0 to 0xec781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581e440 INFO: task kworker/1:751:5768 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9c5d4000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5771 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec785d84 r8:00000002 r7:60000013 r6:ec785d8c r5:857b5400 r5:857b5400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d5f8c r4:857d5c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857b5400 r8:8582252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9ca8a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5772 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5772 tgid:5772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec789d84 r8:00000002 r7:60000013 r6:ec789d8c r5:85763c00 r4:85763c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018205 r8:85763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:857d638c r4:857d6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85822580 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9ca8a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:754:5774 blocked for more than 474 seconds. r4:8502a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec78de08 r5:00001000 r4:eb1ef000 r5:857d678c r4:857d6400 r7:ddde2d80 r6:83018200 r5:857d678c r4:85822600 r10:00000000 r9:85822600 r8:80287e08 r7:ec789e60 r6:85814900 r5:8502a400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581e780 INFO: task kworker/1:754:5774 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9d44e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:5776 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebce9d84 r8:00000002 r7:60000113 r6:ebce9d8c r5:84c58000 r4:84c58000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c58000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ed80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c58000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb331000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d6b8c r4:857d6800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d6b8c r4:85822680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c58000 r8:858226ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebce9fb0 to 0xebce9ff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9d44e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/0:561:5779 blocked for more than 474 seconds. r4:84c58c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 r5:856e3b8c r4:856e3800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e3b8c r4:85814a00 r10:00000000 r9:85814a00 r8:80287e08 r7:ec535e60 r6:85814a80 r5:84c58c00 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857d6f8c r4:857d6c00 r10:00000000 r9:85822700 r8:80287e08 r7:ebce9e60 r6:85814b00 r5:84c59800 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9d72a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5783 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec79dd84 r8:00000002 r7:60000113 r6:ec79dd8c r5:84c5a400 r4:84c5a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c5a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec79de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ea00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d738c r4:857d7000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d738c r4:85822780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c5a400 r8:858227ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822780 r8:80287e08 r7:ec799e60 r6:85814b80 r5:84c5a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec79dfb0 to 0xec79dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9db7c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:5785 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:5785 tgid:5785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec795d84 r8:00000002 r7:60000113 r6:ec795d8c r5:84c5b000 r4:84c5b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c5b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e3f8c r4:856e3c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c5b000 r8:85814c2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:758 state:D stack:0 pid:5787 tgid:5787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84c5c800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:857d778c r4:85822800 r10:00000000 r9:85822800 r8:80287e08 r7:ec79de60 r6:85814d00 r5:84c5c800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5789 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5789 tgid:5789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a1d84 r8:00000002 r7:60000113 r6:ec7a1d8c r5:85836000 r4:85836000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85836000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581f040 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85836000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb695000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d7b8c r4:857d7800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d7b8c r4:85822880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85836000 r8:858228ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822880 r10:00000000 r9:85822880 r8:80287e08 r7:ec7a9e60 r6:85822900 r5:85836000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r5:00001000 r4:e0065000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857dcf8c r4:857dcc00 r7:ddde2d80 r6:83018200 r5:857dcf8c r4:85822980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:5794 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:85839800 r4:85839800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85839800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858217c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85839800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570438c r4:85704000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8570438c r4:85814d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85839800 r8:85814dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85814d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:8583a400 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb831000 r5:857d7f8c r4:857d7c00 r7:ddde2d80 r6:83018200 r5:857d7f8c r4:85822b00 r4:85822b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581f500 INFO: task kworker/1:761:5796 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9e835000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:5797 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5797 tgid:5797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c5d84 r8:00000002 r7:60000113 r6:ec7c5d8c r5:8583b000 r4:8583b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8583b000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb811000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570478c r4:85704400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8570478c r4:85814e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583b000 r8:85814e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85814e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85814e00 r8:80287e08 r7:ec7bde60 r6:85822c00 r5:8583b000 r4:00000001 Exception stack(0xec7c5fb0 to 0xec7c5ff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85838000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7cde08 r4:00000000 r5:00001000 r4:ebba1000 r5:8570538c r4:85705000 r7:dddced80 r6:83018000 r5:8570538c r4:85814e80 r10:00000000 r9:85814e80 r8:80287e08 r7:ec7c5e60 r6:85822c80 r5:85838000 r4:858215c0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:84fbcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba89000 r5:85704f8c r4:85704c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85704f8c r4:85814f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583c800 r8:85814f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85814f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85814f00 r8:80287e08 r7:ec7cde60 r6:85822d00 r5:8583c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d1fb0 to 0xec7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85821780 INFO: task kworker/0:566:5801 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9f174000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec7d5d84 r8:00000002 r7:60000113 r6:ec7d5d8c r5:85838c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581fbc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85838c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857dc38c r4:857dc000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857dc38c r4:85822d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85838c00 r8:85822dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822d80 r8:80287e08 r7:ec7ade60 r6:85822e00 r5:85838c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581f780 INFO: task kworker/1:762:5803 is blocked on a mutex likely owned by task kworker/0:181:3662. Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec7c9d84 r8:00000002 r7:60000013 r6:ec7c9d8c r5:8583d400 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:857dc78c r4:857dc400 r10:61c88647 r9:8583d400 r8:85822eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec7c9fb0 to 0xec7c9ff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5807 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5807 tgid:5807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7ddd84 r8:00000002 r7:60000113 r6:ec7ddd8c r5:8583ec00 r4:8583ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7dde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ffc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8583ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebacf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857dcb8c r4:857dc800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857dcb8c r4:85822f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583ec00 r8:85822fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85822f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85822f80 r8:80287e08 r7:ec7ade60 r6:85816000 r5:8583ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7ddfb0 to 0xec7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581fe40 INFO: task kworker/1:764:5807 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9f9a2000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85833c00 r4:8291a680 r4:00000000 r4:00000000 r5:857dd38c r4:857dd000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85833c00 r8:858160ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe00a9fb0 to 0xe00a9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r9:83018205 r8:8583e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:857dd78c r4:857dd400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857dd78c r4:85816180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583e000 r8:858161ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816180 r8:80287e08 r7:ec7e1e60 r6:85816200 r5:8583e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e5fb0 to 0xec7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85809100 INFO: task kworker/1:766:5811 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9fdc1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84fc3840 r10:8291a684 r9:ec7d9d84 r8:00000002 r7:60000113 r6:ec7d9d8c r5:85840000 r4:00000000 r5:857ddb8c r4:857dd800 r10:61c88647 r9:85840000 r8:858162ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: 9fdc1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:857ddf8c r4:857ddc00 r7:ddde2d80 r6:83018200 r5:857ddf8c r4:85816380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:00001000 r4:e0065000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85840c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r9:83018205 r8:85840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r7:ddde2d80 r6:83018200 r5:857de38c r4:85816480 r4:85816480 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a01f1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5820 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5820 tgid:5820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7e9d84 r8:00000002 r7:60000113 r6:ec7e9d8c r5:85843000 r4:85843000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85843000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85809b00 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857de78c r4:857de400 r10:61c88647 r9:85843000 r8:858165ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec7a5d84 r8:00000002 r7:60000113 r6:ec7a5d8c r5:85843c00 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857deb8c r4:857de800 r4:00000001 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5822 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7f5d84 r8:00000002 r7:60000113 r6:ec7f5d8c r5:85844800 r4:85844800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85844800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85809ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85844800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec605000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857def8c r4:857dec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857def8c r4:85816780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85844800 r8:858167ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816780 r8:80287e08 r7:ec7a5e60 r6:85816800 r5:85844800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) r4:85809c00 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a0ddb000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc3840 r10:8291a684 r9:ec7b1d84 r8:00000002 r7:60000113 r6:ec7b1d8c r5:85845400 r4:85845400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85845400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857df38c r4:857df000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85845400 r8:858168ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:84fbcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85846000 r4:8291a680 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:857df78c r4:857df400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857df78c r4:85816980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85846000 r8:858169ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816980 r8:80287e08 r7:ec7b1e60 r6:85816a00 r5:85846000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7fdfb0 to 0xec7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85809e40 INFO: task kworker/1:774:5828 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a0ddb000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85846c00 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857dfb8c r4:857df800 r10:61c88647 r9:85846c00 r8:85816aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:5831 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec805d84 r8:00000002 r7:60000113 r6:ec805d8c r5:85842400 r4:85842400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85842400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827640 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85842400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6e3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ec78c r4:857ec400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ec78c r4:85816b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85842400 r8:85816bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816b80 r8:80287e08 r7:ec801e60 r6:85816c00 r5:85842400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858271c0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85836c00 r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857dff8c r4:857dfc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857dff8c r4:85816c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85836c00 r8:85816cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816c80 r8:80287e08 r7:ec805e60 r6:85816d00 r5:85836c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec809fb0 to 0xec809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858271c0 INFO: task kworker/1:777:5832 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:5834 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5834 tgid:5834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec80dd84 r8:00000002 r7:60000013 r6:ec80dd8c r5:84c5ec00 r4:84c5ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c5ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857ec38c r4:857ec000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ec38c r4:85816d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c5ec00 r8:85816dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816d80 r8:80287e08 r7:ec805e60 r6:85814f80 r5:84c5ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec80dfb0 to 0xec80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85827380 INFO: task kworker/1:778:5834 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a1e01000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 r5:00001000 r4:e0065000 r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85816e00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85827680 INFO: task kworker/1:779:5837 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a239b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:84ca2f8c r4:84ca2c00 r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:780:5839 blocked for more than 474 seconds. r4:858a8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r5:857ecf8c r4:857ecc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:858a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r5:857ed38c r4:857ed000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858a8c00 r8:85816f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85816f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816f00 r8:80287e08 r7:ec81de60 r6:85868100 r5:858a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec821fb0 to 0xec821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85827700 INFO: task kworker/1:781:5841 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a27c1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5844 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:858aa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r5:857edf8c r4:857edc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec829d84 r8:00000002 r7:60000113 r6:ec829d8c r5:858ab000 r4:858ab000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ab000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec829e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827b80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ed78c r4:857ed400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ed78c r4:8582d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ab000 r8:8582d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d000 r8:80287e08 r7:ec825e60 r6:85868200 r5:858ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec829fb0 to 0xec829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85827980 INFO: task kworker/1:783:5846 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a2bce000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r5:857edb8c r4:857ed800 r10:61c88647 r9:858abc00 r8:8582d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a2e1b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:858ac800 r4:8291a680 r9:83018205 r8:858ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r7:ddde2d80 r6:83018200 r5:857ee38c r4:8582d100 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:858ad400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec835e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbcb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eef8c r4:857eec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eef8c r4:8582d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ad400 r8:8582d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d180 r8:80287e08 r7:ec831e60 r6:85868380 r5:858ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec835fb0 to 0xec835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85827e00 INFO: task kworker/1:786:5852 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a30d8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 r4:84fc3840 task:kworker/1:787 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:858ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:857ee78c r4:857ee400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ae000 r8:8582d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d200 r8:80287e08 r7:ec835e60 r6:85868400 r5:858ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec839fb0 to 0xec839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85827cc0 INFO: task kworker/1:787:5853 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a3516000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:788:5855 blocked for more than 475 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r5:857eeb8c r4:857ee800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eeb8c r4:8582d280 r10:61c88647 r9:8584a400 r8:8582d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r5:8570578c r4:85705400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8570578c r4:85868480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584bc00 r8:858684ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85868480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85868480 r8:80287e08 r7:ec7cde60 r6:8582d380 r5:8584bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586d300 INFO: task kworker/0:567:5858 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a3793000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:789:5860 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:789 state:D stack:0 pid:5860 tgid:5860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec845d84 r8:00000002 r7:60000013 r6:ec845d8c r5:8584b000 r4:8584b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8584b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc07000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ef38c r4:857ef000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ef38c r4:8582d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8582d400 r8:80287e08 r7:ec835e60 r6:8582d480 r5:8584b000 r4:8582e280 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8584d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8584d400 r8:8582d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582e680 INFO: task kworker/1:790:5862 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a3c04000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5864 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec84dd84 r8:00000002 r7:60000013 r6:ec84dd8c r5:8584c800 r4:8584c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec84de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582ed00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8584c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc37000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ef78c r4:857ef400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ef78c r4:8582d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584c800 r8:8582d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d600 r8:80287e08 r7:ec849e60 r6:8582d680 r5:8584c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582e680 INFO: task kworker/1:791:5864 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a3ed5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ec855d84 r8:00000002 r7:60000113 r6:ec855d8c r5:8584ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r9:83018005 r8:8584ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:8593c38c r4:8593c000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8584ec00 r8:8586852c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:569 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586d840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc67000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85705b8c r4:85705800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85705b8c r4:85868580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858aec00 r8:858685ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85868580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85868580 r8:80287e08 r7:ec855e60 r6:85868600 r5:858aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f9fb0 to 0xec7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586d4c0 INFO: task kworker/0:569:5867 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a4284000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8592078c r4:85920400 r10:61c88647 r9:858a9800 r8:8582d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582ea00 INFO: task kworker/1:792:5868 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a4336000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r5:8592138c r4:85921000 r10:61c88647 r9:84c5d400 r8:8586872c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5873 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5873 tgid:5873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000013 r6:ec85dd8c r5:84c5e000 r4:84c5e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c5e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018205 r8:84c5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r5:857eff8c r4:857efc00 Exception stack(0xec85dfb0 to 0xec85dff8) Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:84fbcc80 r4:84fc3840 Call trace: [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r7:ddde2d80 r6:83018200 r5:8592038c r4:8582d880 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85827f80 INFO: task kworker/1:794:5876 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a4ecd000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:84fbcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85920b8c r4:85920800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:e0065000 r4:00000001 task:kworker/1:796 state:D stack:0 pid:5880 tgid:5880 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a52d2000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 r10:8291a684 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:85848000 r9:83018205 r8:85848000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d80 r6:83018200 r5:85921b8c r4:8582da80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fc3840 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r5:85705f8c r4:85705c00 r7:dddced80 r6:83018000 r5:85705f8c r4:85868880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586dc40 INFO: task kworker/0:571:5884 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a54c1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5886 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5886 tgid:5886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:85858000 r4:85858000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85858000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858265c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85858000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec52d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592178c r4:85921400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592178c r4:8582dd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85858000 r8:8582dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582dd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582dd00 r8:80287e08 r7:ec86de60 r6:8582dd80 r5:85858000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826440 INFO: task kworker/1:798:5886 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a54c1000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5888 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5888 tgid:5888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec875d84 r8:00000002 r7:60000113 r6:ec875d8c r5:85858c00 r4:85858c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85858c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826940 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85858c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85921f8c r4:85921c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85921f8c r4:8582de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85858c00 r8:8582de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582de00 r8:80287e08 r7:ec86de60 r6:8582de80 r5:85858c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826600 INFO: task kworker/1:799:5888 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a5ab0000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5890 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:800 state:D stack:0 pid:5890 tgid:5890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec879d84 r8:00000002 r7:60000113 r6:ec879d8c r5:85859800 r4:85859800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85859800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858269c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85859800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592238c r4:85922000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592238c r4:8582df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85859800 r8:8582df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582df00 r8:80287e08 r7:ec875e60 r6:8582df80 r5:85859800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858268c0 INFO: task kworker/1:800:5890 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a5d3f000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5892 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:801 state:D stack:0 pid:5892 tgid:5892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec609d84 r8:00000002 r7:60000113 r6:ec609d8c r5:8585a400 r4:8585a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826d80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585a400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb039000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85922b8c r4:85922800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85922b8c r4:85872000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585a400 r8:8587202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872000 r8:80287e08 r7:ec879e60 r6:85872080 r5:8585a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826880 INFO: task kworker/1:801:5892 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a5ec9000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:802:5893 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:802 state:D stack:0 pid:5893 tgid:5893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec765d84 r8:00000002 r7:60000013 r6:ec765d8c r5:8585b000 r4:8585b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826bc0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592278c r4:85922400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592278c r4:85872100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585b000 r8:8587212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872100 r8:80287e08 r7:ec609e60 r6:85872180 r5:8585b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec765fb0 to 0xec765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826880 INFO: task kworker/1:802:5893 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a62d5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7b5d84 r8:00000002 r7:60000013 r6:ec7b5d8c r5:8585bc00 r4:8585bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85922f8c r4:85922c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85922f8c r4:85872200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585bc00 r8:8587222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872200 r8:80287e08 r7:ec609e60 r6:85872280 r5:8585bc00 r4:85826c00 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:e00a9dc0 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb233000 r5:8592338c r4:85923000 r10:61c88647 r9:8585c800 r8:8587232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r5:00001000 r4:e0065000 r4:84fbcc80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586de00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592378c r4:85923400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592378c r4:85872400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585d400 r8:8587242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872400 r8:80287e08 r7:ec87de60 r6:85872480 r5:8585d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826e40 INFO: task kworker/1:805:5900 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a6b0e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:8585e000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8585ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85923f8c r4:85923c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85923f8c r4:85872600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585ec00 r8:8587262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872600 r8:80287e08 r7:ec885e60 r6:85872680 r5:8585ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587d240 INFO: task kworker/1:807:5904 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a6e5f000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85860000 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5908 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec891d84 r8:00000002 r7:60000013 r6:ec891d8c r5:85860c00 r4:85860c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85860c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d4c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85860c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592838c r4:85928000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592838c r4:85872800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85860c00 r8:8587282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872800 r10:00000000 r9:85872800 r8:80287e08 r7:ec88de60 r6:85872880 r5:85860c00 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85861800 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:85861800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r7:ddde2d80 r6:83018200 r5:85928f8c r4:85872900 r4:85872900 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587d340 INFO: task kworker/1:810:5910 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a769c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:5911 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec899d84 r8:00000002 r7:60000013 r6:ec899d8c r5:85862400 r4:85862400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85862400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587d7c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85862400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85928b8c r4:85928800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85928b8c r4:85872a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85862400 r8:85872a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872a00 r8:80287e08 r7:ec895e60 r6:85872a80 r5:85862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec899fb0 to 0xec899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587d340 INFO: task kworker/1:811:5911 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8592978c r4:85929400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec89dfb0 to 0xec89dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5916 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5916 tgid:5916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a1d84 r8:00000002 r7:60000013 r6:ec8a1d8c r5:85863c00 r4:85863c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85863c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587dac0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85863c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592938c r4:85929000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592938c r4:85872c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85863c00 r8:85872c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872c00 r8:80287e08 r7:ec89de60 r6:85872c80 r5:85863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8587d8c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85864800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb865000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85929b8c r4:85929800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85929b8c r4:85872d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85864800 r8:85872d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872d00 r8:80287e08 r7:ec89de60 r6:85872d80 r5:85864800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a5fb0 to 0xec8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587dcc0 INFO: task kworker/1:814:5918 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a7f42000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5920 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a9d84 r8:00000002 r7:60000013 r6:ec8a9d8c r5:85865400 r4:85865400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85865400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85890380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85865400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb8d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8592ab8c r4:8592a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85865400 r8:85872e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872e00 r8:80287e08 r7:ec8a5e60 r6:85872e80 r5:85865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587df00 INFO: task kworker/1:815:5920 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:816:5921 blocked for more than 475 seconds. r4:85866000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592a38c r4:8592a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592a38c r4:85872f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85866000 r8:85872f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85872f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85872f00 r8:80287e08 r7:ec8a9e60 r6:85872f80 r5:85866000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b1fb0 to 0xec8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587df00 INFO: task kworker/1:816:5921 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a836d000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:844d9800 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8592a78c r4:8592a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844d9800 r8:8588d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:818:5927 blocked for more than 475 seconds. r5:844da400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8592b38c r4:8592b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592b38c r4:8588d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844da400 r8:8588d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d080 r8:80287e08 r7:ec8a9e60 r6:85868980 r5:844da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85890200 INFO: task kworker/1:818:5927 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a8946000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:5928 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:844db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r9:83018205 r8:844db000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:8592af8c r4:8592ac00 r7:ddde2d80 r6:83018200 r5:8592af8c r4:8588d100 r4:00000001 r4:85890200 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:5931 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000113 r6:ec8cdd8c r5:844dbc00 r4:844dbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85890b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec603000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593438c r4:85934000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593438c r4:8588d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dbc00 r8:8588d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d180 r8:80287e08 r7:ec8bde60 r6:85868a80 r5:844dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85890400 INFO: task kworker/1:820:5931 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a8a28000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5932 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5932 tgid:5932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d1d84 r8:00000002 r7:60000113 r6:ec8d1d8c r5:844d8c00 r4:844d8c00 r5:844d8c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8592b78c r4:8592b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8588d200 r8:80287e08 r7:ec8cde60 r6:85868b00 r5:844d8c00 r4:85890400 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec59f000 r5:8592bb8c r4:8592b800 r7:ddde2d80 r6:83018200 r5:8592bb8c r4:8588d280 Exception stack(0xec8d9fb0 to 0xec8d9ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:5937 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:5937 tgid:5937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8add84 r8:00000002 r7:60000113 r6:ec8add8c r5:844dc800 r4:844dc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d180 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570678c r4:85706400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8570678c r4:85868c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dc800 r8:85868c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85868c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85868c00 r8:80287e08 r7:ec855e60 r6:85868c80 r5:844dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587cc80 INFO: task kworker/0:572:5937 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a9250000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe00a9fb0 to 0xe00a9ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec8ddd84 r8:00000002 r7:60000113 r6:ec8ddd8c r5:844dec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8592bf8c r4:8588d300 r4:00000001 r4:85890780 Workqueue: events bpf_prog_free_deferred Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a9250000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5941 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5941 tgid:5941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e9d84 r8:00000002 r7:60000113 r6:ec8e9d8c r5:844dd400 r4:844dd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85890c00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec627000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593478c r4:85934400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593478c r4:8588d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dd400 r8:8588d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d380 r8:80287e08 r7:ec8cde60 r6:85868d80 r5:844dd400 r4:85890ac0 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5943 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5943 tgid:5943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8f1d84 r8:00000002 r7:60000013 r6:ec8f1d8c r5:84c18c00 r4:84c18c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c18c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85934b8c r4:85934800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r5:800e0113 r4:80239bb0 r4:82ac21e4 r4:e00a9dc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:5947 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8f9d84 r8:00000002 r7:60000113 r6:ec8f9d8c r5:84c1a400 r4:84c1a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c1a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587dd00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593538c r4:85935000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593538c r4:8588d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c1a400 r8:8588d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d500 r8:80287e08 r7:ec8f5e60 r6:85868f00 r5:84c1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f9fb0 to 0xec8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85890cc0 INFO: task kworker/1:827:5947 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: a9dd7000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:828:5949 blocked for more than 476 seconds. r4:84c1b000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec709000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8588d580 r8:80287e08 r7:ec8f9e60 r6:85868f80 r5:84c1b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85890cc0 Workqueue: events bpf_prog_free_deferred 9d20: aa267000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5951 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec901d84 r8:00000002 r7:60000013 r6:ec901d8c r5:84c1bc00 r4:84c1bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c1bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85890740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec719000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85935b8c r4:85935800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85935b8c r4:8588d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c1bc00 r8:8588d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d600 r8:80287e08 r7:ec8fde60 r6:858a2000 r5:84c1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8587c440 INFO: task kworker/1:829:5951 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: aa267000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84c1c800 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85935f8c r4:85935c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0065000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84c1d400 r4:8291a680 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84c1d400 r8:8588d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5957 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec90dd84 r8:00000002 r7:60000113 r6:ec90dd8c r5:84c1e000 r4:84c1e000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c1e000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858985c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84c1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85936b8c r4:85936800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85936b8c r4:8588d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c1e000 r8:8588d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d780 r8:80287e08 r7:ec909e60 r6:858a2180 r5:84c1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec90dfb0 to 0xec90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: aa71a000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) INFO: task kworker/1:833:5959 blocked for more than 476 seconds. r5:84c1ec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898480 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593678c r4:85936400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593678c r4:8588d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c1ec00 r8:8588d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d800 r8:80287e08 r7:ec90de60 r6:858a2200 r5:84c1ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858980c0 INFO: task kworker/1:833:5959 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: aac48000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5961 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5961 tgid:5961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84c18000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r4:00000000 r5:00001000 r4:ec915000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85936f8c r4:85936c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c18000 r8:8588d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d880 r8:80287e08 r7:ec90de60 r6:858a2280 r5:84c18000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85898440 INFO: task kworker/1:834:5961 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: aac48000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898980 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593778c r4:85937400 r10:61c88647 r9:844d8000 r8:8588d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: aac48000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5965 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5965 tgid:5965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec931d84 r8:00000002 r7:60000013 r6:ec931d8c r5:858b8000 r4:858b8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858b8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858b8000 r8:8588d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:837:5967 blocked for more than 476 seconds. r4:858b8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08 r5:00001000 r4:dfb2f000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858b8c00 r8:8588da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588da00 r8:80287e08 r7:ec925e60 r6:858a2400 r5:858b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec93dfb0 to 0xec93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85898640 INFO: task kworker/1:837:5967 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: aaf4f000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 task:kworker/1:838 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85937b8c r4:85937800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r5:800e0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5971 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec955d84 r8:00000002 r7:60000113 r6:ec955d8c r5:858ba400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85937f8c r4:85937c00 r7:ddde2d80 r6:83018200 r5:85937f8c r4:8588db00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: aba66000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5975 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:5975 tgid:5975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec95dd84 r8:00000002 r7:60000113 r6:ec95dd8c r5:858bbc00 r4:858bbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858bbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898e80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea973000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593878c r4:85938400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593878c r4:8588dc00 r10:61c88647 r9:858bbc00 r8:8588dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: aba66000 ecef1000 00000001 80239b98 7f14d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:842:5977 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec8b9d84 r8:00000002 r7:60000013 r6:ec8b9d8c r5:858bc800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85938b8c r4:85938800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85938b8c r4:8588dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858bc800 r8:8588dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588dc80 r8:80287e08 r7:ec959e60 r6:858a2680 r5:858bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b9fb0 to 0xec8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85898d00 INFO: task kworker/1:842:5977 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: abd34000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896340 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858bd400 r8:8588dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: abfce000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:5982 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:5982 tgid:5982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec965d84 r8:00000002 r7:60000013 r6:ec965d8c r5:858be000 r4:858be000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858be000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 r4:00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593938c r4:85939000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:5984 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8edd84 r8:00000002 r7:60000113 r6:ec8edd8c r5:858bec00 r4:858bec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858bec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85990e40 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570738c r4:85707000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe00a9d28 to 0xe00a9d70) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:82ac21e4 r4:e00a9dc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896140 INFO: task kworker/1:845:5986 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ac434000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:5988 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:5988 tgid:5988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec971d84 r8:00000002 r7:60000013 r6:ec971d8c r5:85048c00 r4:85048c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896480 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85939f8c r4:85939c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85048c00 r8:8588deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: ac8eb000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:847 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ec975d84 r8:00000002 r7:60000013 r6:ec975d8c r5:85049800 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:ebc0f000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593a38c r4:8593a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593a38c r4:8588df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85049800 r8:8588df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588df00 r8:80287e08 r7:ec971e60 r6:858a2a00 r5:85049800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec975fb0 to 0xec975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896300 INFO: task kworker/1:847:5990 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ac8eb000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:5992 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:5992 tgid:5992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec979d84 r8:00000002 r7:60000113 r6:ec979d8c r5:8504a400 r4:8504a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896700 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8504a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc2d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8593a78c r4:8588df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504a400 r8:8588dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588df80 r8:80287e08 r7:ec975e60 r6:858a2a80 r5:8504a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec979fb0 to 0xec979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896440 INFO: task kworker/1:848:5992 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: acb89000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 task:kworker/1:849 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec97dfb0 to 0xec97dff8) r4:85896580 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5996 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5996 tgid:5996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec981d84 r8:00000002 r7:60000013 r6:ec981d8c r5:8504bc00 r4:8504bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896a00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8504bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc77000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593af8c r4:8593ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593af8c r4:85899080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504bc00 r8:858990ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899080 r8:80287e08 r7:ec97de60 r6:858a2b80 r5:8504bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec981fb0 to 0xec981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896740 INFO: task kworker/1:850:5996 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: acdd5000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5998 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5998 tgid:5998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:8504c800 r4:8504c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896b00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8504c800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc95000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593b38c r4:8593b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8504c800 r8:8589912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 INFO: task kworker/1:852:6000 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:6000 tgid:6000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec989d84 r8:00000002 r7:60000013 r6:ec989d8c r5:8504d400 r4:8504d400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504d400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896c80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8504d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593b78c r4:8593b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593b78c r4:85899180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504d400 r8:858991ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899180 r8:80287e08 r7:ec985e60 r6:858a2c80 r5:8504d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896900 INFO: task kworker/1:852:6000 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ad0e8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebceb000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:6004 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec991d84 r8:00000002 r7:60000113 r6:ec991d8c r5:8504ec00 r4:8504ec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504ec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85896e00 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593bb8c r4:8593b800 r10:61c88647 r9:8504ec00 r8:858992ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:e00a9dc0 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:84ca2f8c r4:84ca2c00 r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:855:6006 blocked for more than 476 seconds. r4:858c0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593bf8c r4:8593bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593bf8c r4:85899300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c0c00 r8:8589932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899300 r8:80287e08 r7:ec991e60 r6:858a2e00 r5:858c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896c00 INFO: task kworker/1:855:6006 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ad8d4000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred r5:858c2400 r4:8291a680 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec83d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593c78c r4:8593c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593c78c r4:85899380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c2400 r8:858993ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899380 r8:80287e08 r7:ec999e60 r6:858a2e80 r5:858c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896d00 INFO: task kworker/1:856:6008 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ad8d4000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593cb8c r4:8593c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593cb8c r4:85899400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c3000 r8:8589942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899400 r8:80287e08 r7:ec9a1e60 r6:858a2f00 r5:858c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589f080 INFO: task kworker/1:857:6011 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ade0b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:6012 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8593df8c r4:85899480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: ae265000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:574:6014 blocked for more than 476 seconds. r5:858c0000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85990380 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85706f8c r4:858a4000 r10:00000000 r9:858a4000 r8:80287e08 r7:ec8ede60 r6:858a4080 r5:858c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589dc40 INFO: task kworker/0:574:6014 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ae37d000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:6016 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:858c5400 r4:858c5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589f380 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bf000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593cf8c r4:8593cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85899500 r8:80287e08 r7:ec9b9e60 r6:858a4100 r5:858c5400 Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589f200 INFO: task kworker/1:859:6016 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: ae37d000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:860:6017 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589f480 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593d38c r4:8593d000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593d38c r4:85899580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c6000 r8:858995ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899580 r8:80287e08 r7:ec9b9e60 r6:858a4180 r5:858c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d9fb0 to 0xec9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589f200 INFO: task kworker/1:860:6017 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800e0113 r4:80239bb0 r4:e00a9dc0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r4:84fc3840 task:kworker/1:861 state:D stack:0 pid:6019 tgid:6019 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589f500 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: ae8a2000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a9d84 r8:00000002 r7:60000113 r6:ec9a9d8c r5:8595b000 r4:8595b000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595b000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589f740 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8595b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593db8c r4:8593d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593db8c r4:85899680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595b000 r8:858996ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899680 r8:80287e08 r7:ec9b9e60 r6:85899700 r5:8595b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a9fb0 to 0xec9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589f3c0 INFO: task kworker/1:862:6021 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: aeb12000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:863:6024 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:863 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000113 r6:ec9edd8c r5:8595bc00 r4:8595bc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595bc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589da40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8595bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca53000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593f78c r4:8593f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593f78c r4:85899780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595bc00 r8:858997ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899780 r8:80287e08 r7:ec9b9e60 r6:85899800 r5:8595bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9edfb0 to 0xec9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589f700 INFO: task kworker/1:863:6024 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:865 state:D stack:0 pid:6027 tgid:6027 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593e78c r4:8593e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593e78c r4:85899900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85960c00 r8:8589992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899900 r8:80287e08 r7:ec9ede60 r6:858a4300 r5:85960c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca21fb0 to 0xeca21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589f900 INFO: task kworker/1:865:6027 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: af221000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeca2dfb0 to 0xeca2dff8) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:84fc3840 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eca37000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593ef8c r4:8593ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593ef8c r4:85899a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85961800 r8:85899a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899a00 r8:80287e08 r7:ec9ede60 r6:858a4400 r5:85961800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8589fb00 INFO: task kworker/1:867:6031 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: af4fd000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8595c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r5:8593f38c r4:8593f000 r10:61c88647 r9:8595c800 r8:85899aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 INFO: task kworker/1:869:6036 blocked for more than 476 seconds. r5:8595d400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a3300 r5:00001000 r4:eca7f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594038c r4:85940000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594038c r4:85899b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595d400 r8:85899bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899b80 r8:80287e08 r7:ec9ede60 r6:85899c00 r5:8595d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca45fb0 to 0xeca45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85896f80 INFO: task kworker/1:869:6036 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: af4fd000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fc3840 task:kworker/1:870 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8593fb8c r4:8593f800 r10:61c88647 r9:8595e000 r8:85899cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:85896f80 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8593ff8c r4:8593fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593ff8c r4:85899d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85963000 r8:85899dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899d80 r8:80287e08 r7:eca45e60 r6:858a4480 r5:85963000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca75fb0 to 0xeca75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a3000 INFO: task kworker/1:871:6039 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: afa3c000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:6041 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:6041 tgid:6041 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8594078c r4:85899e00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:85940b8c r4:85940800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85940b8c r4:85899e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85962400 r8:85899eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85899e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85899e80 r8:80287e08 r7:eca7de60 r6:858a4580 r5:85962400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca99fb0 to 0xeca99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a3180 INFO: task kworker/1:873:6044 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: afeee000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:874:6046 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:874 state:D stack:0 pid:6046 tgid:6046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaa5d84 r8:00000002 r7:60000113 r6:ecaa5d8c r5:85964800 r4:85964800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85964800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a3840 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594138c r4:85941000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85899f00 Exception stack(0xecaa5fb0 to 0xecaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a33c0 INFO: task kworker/1:874:6046 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: afeee000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 INFO: task kworker/1:875:6047 blocked for more than 477 seconds. [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85940f8c r4:85940c00 r10:61c88647 r9:85966000 r8:85899fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 task:kworker/1:876 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85966c00 r8:859af02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a32c0 INFO: task kworker/1:876:6050 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b04a3000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:877 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8594178c r4:85941400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 task:kworker/0:575 state:D stack:0 pid:6053 tgid:6053 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a7280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85707b8c r4:85707800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85707b8c r4:858a4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c1800 r8:858a482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858a4800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a4800 r8:80287e08 r7:ec8ede60 r6:858a4880 r5:858c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85990140 INFO: task kworker/0:575:6053 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b0764000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:878:6057 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:878 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eca69d84 r8:00000002 r7:60000013 r6:eca69d8c r5:85050000 r4:00000000 r5:8594278c r4:85942400 r7:ddde2d80 r6:83018200 r5:8594278c r4:859af100 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: b0872000 ecef1000 00000001 80239b98 7f14d000 00000001 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fc3840 Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:85051800 r4:85051800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85051800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a3f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85051800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85941f8c r4:85941c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85941f8c r4:859af180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85051800 r8:859af1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 r5:84ecb78c r4:84ecb400 r7:dddced80 r6:83018000 r5:84ecb78c r4:858a4a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85050c00 r8:858a4a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858a4a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a4a00 r8:80287e08 r7:ecacde60 r6:858a4a80 r5:85050c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae5fb0 to 0xecae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a7340 INFO: task kworker/0:576:6064 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b0fd0000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:858a4b00 r8:80287e08 r7:ecae5e60 r6:858a4b80 r5:85053000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 INFO: task kworker/0:578:6066 blocked for more than 477 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bc280 r7:dddced80 r6:83018000 r5:84ecaf8c r4:858a4c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85054800 r4:8291a680 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ebb7f000 r5:84ecb38c r4:84ecb000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85054800 r8:858a4d2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: b1587000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 r4:00000000 r5:84ca2f8c r4:84ca2c00 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:880:6069 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:880 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf9d84 r8:00000002 r7:60000113 r6:ecaf9d8c r5:85056000 r4:85056000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85056000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a3b40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85056000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e1000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85056000 r8:859af22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:881 state:D stack:0 pid:6070 tgid:6070 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85942f8c r4:859af280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85056c00 r8:859af2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859af280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859af280 r8:80287e08 r7:eca69e60 r6:858a4e80 r5:85056c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecafdfb0 to 0xecafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a3fc0 INFO: task kworker/1:881:6070 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b195d000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:e00a9dc0 r5:84ca2f8c r4:84ca2c00 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Workqueue: events bpf_prog_free_deferred [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85942b8c r4:85942800 r10:61c88647 r9:85055400 r8:859af32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:6074 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:6074 tgid:6074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb0dd84 r8:00000002 r7:60000113 r6:ecb0dd8c r5:858c8c00 r4:858c8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c8c00 r4:8291a680 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85943f8c r4:85943c00 r10:61c88647 r9:858c8c00 r8:859af3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:e00a9dc0 r5:84ca2f8c r4:84ca2c00 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8594338c r4:85943000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r5:84ca2f8c r4:84ca2c00 Exception stack(0xe00a9fb0 to 0xe00a9ff8) task:kworker/1:885 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb1dd84 r8:00000002 r7:60000013 r6:ecb1dd8c r5:858c9800 r4:858c9800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c9800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a6440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594378c r4:85943400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594378c r4:859af480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c9800 r8:859af4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859af480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859af480 r8:80287e08 r7:ecb0de60 r6:859b3080 r5:858c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a6140 INFO: task kworker/1:885:6078 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b2198000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:e00a9dc0 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:8291a684 r9:ecb29d84 r8:00000002 r7:60000113 r6:ecb29d8c r5:858ca400 r9:83018205 r8:858ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:858ca400 r8:859af52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a6200 INFO: task kworker/1:886:6081 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b2458000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Workqueue: events bpf_prog_free_deferred [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85944b8c r4:85944800 r4:859af580 r4:859a6400 r4:00000000 r4:82ac21e4 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84fc3840 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecadde08 r5:8594438c r4:85944000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecaddfb0 to 0xecaddff8) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:580:6086 blocked for more than 477 seconds. r5:85958000 r4:8291a680 r4:00000000 r5:8591038c r4:85910000 r4:859b3200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:6088 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:858cbc00 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84ecab8c r4:84eca800 r10:61c88647 r9:858cbc00 r8:859b332c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594478c r4:85944400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594478c r4:859af700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858cd400 r8:859af72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859af700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859af700 r8:80287e08 r7:ecb2de60 r6:859b3400 r5:858cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a6900 INFO: task kworker/1:889:6091 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r5:00001000 r4:e0065000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 task:kworker/1:890 state:D stack:0 pid:6093 tgid:6093 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec6a3000 r7:ddde2d80 r6:83018200 r5:85944f8c r4:859af780 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:8591078c r4:859b3480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85866c00 r8:859b34ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859b3480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b3480 r8:80287e08 r7:ecb39e60 r6:859af880 r5:85866c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859bc6c0 INFO: task kworker/0:582:6095 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b361b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8591238c r4:85912000 r10:61c88647 r9:85968000 r8:859b352c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred 9d20: b3907000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:6099 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ecb35d84 r8:00000002 r7:60000013 r6:ecb35d8c r5:858cec00 r9:83018005 r8:858cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:85910b8c r4:85910800 r4:859b3580 r4:859bc740 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r5:84ca2f8c r4:84ca2c00 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:6101 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8594538c r4:85945000 r7:ddde2d80 r6:83018200 r5:8594538c r4:859af980 r4:859a6fc0 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:892:6104 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:892 state:D stack:0 pid:6104 tgid:6104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85945f8c r4:85945c00 r7:ddde2d80 r6:83018200 r5:85945f8c r4:859afa00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: b4551000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:00000000 r5:84ca2f8c r4:84ca2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84fc3840 r10:8291a684 r9:ecb65d84 r8:00000002 r7:60000113 r6:ecb65d8c r5:851d1800 r4:00000000 r5:8594578c r4:85945400 r10:61c88647 r9:851d1800 r8:859afaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:894:6106 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:894 state:D stack:0 pid:6106 tgid:6106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb69d84 r8:00000002 r7:60000113 r6:ecb69d8c r5:851d2400 r4:851d2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb69e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0080 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85945b8c r4:85945800 r10:61c88647 r9:851d2400 r8:859afb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 task:kworker/1:895 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb75d84 r8:00000002 r7:60000113 r6:ecb75d8c r5:851d3000 r4:851d3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb75e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0580 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851d3000 r8:859afbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b0340 r4:00000000 r4:e00a9dc0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fc3840 INFO: task kworker/1:896:6112 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:896 state:D stack:0 pid:6112 tgid:6112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb81d84 r8:00000002 r7:60000113 r6:ecb81d8c r5:851d5400 r4:851d5400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d5400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8594678c r4:85946400 r7:ddde2d80 r6:83018200 r5:8594678c r4:859afc00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85946b8c r4:85946800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85946b8c r4:859afc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d3c00 r8:859afcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859afc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afc80 r8:80287e08 r7:ecb81e60 r6:859b3980 r5:851d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b0380 INFO: task kworker/1:897:6113 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b5882000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 r5:00001000 r4:e0065000 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Call trace: [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85946f8c r4:85946c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85946f8c r4:859afd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d4800 r8:859afd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859afd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afd00 r8:80287e08 r7:ecb85e60 r6:859b3a00 r5:851d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b0700 INFO: task kworker/1:898:6116 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe00a9d28 to 0xe00a9d70) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Call trace: [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8594738c r4:85947000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9d28 to 0xe00a9d70) r4:00000000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8594778c r4:85947400 r4:859afe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afe00 r8:80287e08 r7:ecb95e60 r6:859b3b00 r5:851d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b0a40 INFO: task kworker/1:900:6118 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b637a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85910f8c r4:85910c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859cc080 INFO: task kworker/0:585:6121 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b637a000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:6123 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:85052400 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8591178c r4:859b3c80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: b6750000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:84ca2f8c r4:84ca2c00 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Workqueue: events bpf_prog_free_deferred [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85947b8c r4:85947800 r4:859afe80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:902:6126 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8594c38c r4:8594c000 r10:61c88647 r9:859d0000 r8:859aff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85947f8c r4:85947c00 r10:61c88647 r9:859d0c00 r8:859affac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594c78c r4:8594c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594c78c r4:859b9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d1800 r8:859b902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9000 r8:80287e08 r7:ecbb9e60 r6:859b3f00 r5:859d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd9fb0 to 0xecbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859c0240 INFO: task kworker/1:904:6131 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b750b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r4:82ac21e4 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbdde08 r5:8594cb8c r4:8594c800 r10:61c88647 r9:859d2400 r8:859b90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859c0180 INFO: task kworker/1:905:6133 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) r4:82ac21e4 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe00a9fb0 to 0xe00a9ff8) Call trace: [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8594cf8c r4:8594cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594cf8c r4:859b9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d3000 r8:859b912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9100 r8:80287e08 r7:ecbdde60 r6:859c8000 r5:859d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859c0340 INFO: task kworker/1:906:6135 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r5:84ca2f8c r4:84ca2c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:859d3c00 r4:8291a680 r4:00000000 r5:8594d38c r4:8594d000 r4:859b9180 r4:859c0240 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b7977000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8594d78c r4:8594d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:859d5400 r8:859b92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859c0740 INFO: task kworker/1:909:6141 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b7977000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:859d6000 r4:8291a680 r4:00000000 r5:8594df8c r4:8594dc00 r7:ddde2d80 r6:83018200 r5:8594df8c r4:859b9300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fc3840 r10:8291a684 r9:ecc25d84 r8:00000002 r7:60000013 r6:ecc25d8c r5:859d6c00 r9:83018205 r8:859d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 r10:61c88647 r9:859d6c00 r8:859b93ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859c07c0 INFO: task kworker/1:911:6145 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b81ac000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c0dc0 r5:8594e78c r4:8594e400 r4:859b9400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:913:6149 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc3dd84 r8:00000002 r7:60000113 r6:ecc3dd8c r5:859d8c00 r4:859d8c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d8c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc3de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c0ec0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594eb8c r4:8594e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594eb8c r4:859b9480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d8c00 r8:859b94ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9480 r8:80287e08 r7:ecc31e60 r6:859c8380 r5:859d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:859d9800 r4:8291a680 r4:00000000 r5:8594ef8c r4:8594ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Call trace: [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594f38c r4:8594f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594f38c r4:859b9580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859da400 r8:859b95ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9580 r8:80287e08 r7:ecc49e60 r6:859c8480 r5:859da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859c0e40 INFO: task kworker/1:915:6154 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b894e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8594f78c r4:8594f400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 r4:82ac21e4 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe00a9fb0 to 0xe00a9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:6158 tgid:6158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:8596a400 r4:8596a400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8596a400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c2300 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8596a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb881000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594fb8c r4:8594f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594fb8c r4:859b9700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:84fbcc80 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:6159 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:6159 tgid:6159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d5d84 r8:00000002 r7:60000013 r6:ec9d5d8c r5:8596c800 r4:8596c800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8596c800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d5e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594ff8c r4:8594fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594ff8c r4:859b9800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596c800 r8:859b982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9800 r8:80287e08 r7:ec9b1e60 r6:859b9880 r5:8596c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8596b000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c2e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8596b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85950f8c r4:85950c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85950f8c r4:859b9900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596b000 r8:859b992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:859c2680 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:6163 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:920 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8595038c r4:85950000 r7:ddde2d80 r6:83018200 r5:8595038c r4:859b9a00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r5:8595078c r4:85950400 r10:61c88647 r9:8596d400 r8:859b9b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: b9cd8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08 r5:85950b8c r4:85950800 r7:ddde2d80 r6:83018200 r5:85950b8c r4:859b9c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) r10:8291a684 r9:eca01d84 r8:00000002 r7:60000113 r6:eca01d8c r5:859dc800 r4:859dc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859dc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c0240 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85951b8c r4:85951800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85951b8c r4:859b9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859dc800 r8:859b9cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9c80 r8:80287e08 r7:ec9e5e60 r6:859c8580 r5:859dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca01fb0 to 0xeca01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859c2c40 INFO: task kworker/1:923:6169 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r5:859dd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c2280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595138c r4:85951000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595138c r4:859b9d00 Exception stack(0xec9f5fb0 to 0xec9f5ff8) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:82ac21e4 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r4:00000001 r4:84fc3840 r4:859de000 [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8595178c r4:85951400 r10:61c88647 r9:859de000 r8:859b9dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:926:6177 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:926 state:D stack:0 pid:6177 tgid:6177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca4dd84 r8:00000002 r7:60000113 r6:eca4dd8c r5:851f0000 r4:851f0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cb280 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec539000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595238c r4:85952000 r10:61c88647 r9:851f0000 r8:859b9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:851f1800 r4:8291a680 r4:00000000 r5:85951f8c r4:85951c00 r10:61c88647 r9:851f1800 r8:859b9eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:928:6181 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:928 state:D stack:0 pid:6181 tgid:6181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec83b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595278c r4:85952400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595278c r4:859b9f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f3000 r8:859b9f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9f00 r8:80287e08 r7:eca4de60 r6:859c8800 r5:851f3000 r4:859cb1c0 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:e00a9dc0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:929 state:D stack:0 pid:6183 tgid:6183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:851f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:8595378c r4:85953400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595378c r4:859b9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f0c00 r8:859b9fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b9f80 r8:80287e08 r7:eca71e60 r6:859c8880 r5:851f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca89fb0 to 0xeca89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859cb300 INFO: task kworker/1:929:6183 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) task:kworker/1:930 state:D stack:0 pid:6185 tgid:6185 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85952b8c r4:85952800 r4:85a49000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: bbbb8000 ecef1000 00000001 80239b98 7f14d000 00000001 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:851f3c00 r4:8291a680 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cb6c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85952f8c r4:85952c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85952f8c r4:85a49080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f3c00 r8:85a490ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49080 r8:80287e08 r7:eca89e60 r6:859c8980 r5:851f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac1fb0 to 0xecac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859cb3c0 INFO: task kworker/1:931:6186 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: bbd89000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a49100 r8:80287e08 r7:eca89e60 r6:85a49180 r5:8596e000 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 Not tainted 6.15.0-rc5-syzkaller #0 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85953f8c r4:85953c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85953f8c r4:85a49200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596ec00 r8:85a4922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49200 r8:80287e08 r7:eca89e60 r6:85a49280 r5:8596ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac9fb0 to 0xecac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859cb7c0 INFO: task kworker/1:933:6191 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: bc485000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84ca2f8c r4:84ca2c00 r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85953b8c r4:85953800 r4:85a49300 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe00a9d28 to 0xe00a9d70) r4:e00a9dc0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:6193 tgid:6193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc59d84 r8:00000002 r7:60000113 r6:ecc59d8c r5:851f4800 r4:851f4800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f4800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cf000 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc91000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85911b8c r4:85911800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85911b8c r4:859c8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f4800 r8:859c8a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859c8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c8a00 r8:80287e08 r7:ecb51e60 r6:859c8a80 r5:851f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc59fb0 to 0xecc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: bcb85000 ecef1000 00000001 80239b98 7f14d000 00000001 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:6196 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:6196 tgid:6196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8595478c r4:85954400 r7:ddde2d80 r6:83018200 r5:8595478c r4:85a49400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:936:6197 blocked for more than 478 seconds. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cbe00 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca77000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595438c r4:85954000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595438c r4:85a49480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f6c00 r8:85a494ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49480 r8:80287e08 r7:ecc65e60 r6:859c8b80 r5:851f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:84fbcc80 r4:84fc3840 r4:859dec00 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85954b8c r4:85954800 r7:ddde2d80 r6:83018200 r5:85954b8c r4:85a49500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859dec00 r8:85a4952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49500 r8:80287e08 r7:ecc65e60 r6:859c8c00 r5:859dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc71fb0 to 0xecc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859cbd00 INFO: task kworker/1:937:6199 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 9d20: bd541000 ecef1000 00000001 80239b98 7f14d000 00000001 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85954f8c r4:85a49580 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: bd9cd000 ecef1000 00000001 80239b98 7f14d000 00000001 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fc3840 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc7de08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595538c r4:85955000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595538c r4:85a49600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f5400 r8:85a4962c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49600 r8:80287e08 r7:ecc75e60 r6:859c8d00 r5:851f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc7dfb0 to 0xecc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a59100 INFO: task kworker/1:939:6204 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: bded6000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a59080 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595578c r4:85955400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595578c r4:85a49680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e0000 r8:85a496ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49680 r8:80287e08 r7:ecc7de60 r6:859c8d80 r5:859e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc89fb0 to 0xecc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a591c0 INFO: task kworker/1:940:6206 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:941 state:D stack:0 pid:6208 tgid:6208 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:859e0c00 r8:85a4972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cff40 r5:85911f8c r4:85911c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9d28 to 0xe00a9d70) r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:6213 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:6213 tgid:6213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca31d84 r8:00000002 r7:60000113 r6:eca31d8c r5:859e2400 r4:859e2400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e2400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85913b8c r4:85913800 r7:dddced80 r6:83018000 r5:85913b8c r4:859c8f80 r4:85a56080 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859e3000 r5:8591278c r4:85912400 r10:61c88647 r9:859e3000 r8:85a530ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:942 state:D stack:0 pid:6216 tgid:6216 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8595638c r4:85956000 r10:61c88647 r9:859e3c00 r8:85a497ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a595c0 9d20: be5f9000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:00000000 r5:84ca2f8c r4:84ca2c00 9fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eccc9d84 r8:00000002 r7:60000013 r6:eccc9d8c r5:859e4800 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85955f8c r4:85955c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85955f8c r4:85a49800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e4800 r8:85a4982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49800 r8:80287e08 r7:eccbde60 r6:85a53200 r5:859e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc9fb0 to 0xeccc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a59780 INFO: task kworker/1:943:6218 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: be9af000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc5-syzkaller #0 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8595678c r4:85956400 r4:85a49880 r10:00000000 r9:85a49880 r8:80287e08 r7:eccbde60 r6:85a53280 r5:859e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccadfb0 to 0xeccadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 r5:84ca2f8c r4:84ca2c00 r4:00000001 INFO: task kworker/1:945:6223 blocked for more than 478 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb01e08 r5:85956b8c r4:85956800 r7:ddde2d80 r6:83018200 r5:85956b8c r4:85a49900 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: bf1e8000 ecef1000 00000001 80239b98 7f14d000 00000001 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:946:6225 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:946 state:D stack:0 pid:6225 tgid:6225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb21d84 r8:00000002 r7:60000013 r6:ecb21d8c r5:859e6c00 r4:859e6c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e6c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859e6c00 r8:85a499ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:947:6226 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84e60000 r8:85a49a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49a00 r8:80287e08 r7:ecb21e60 r6:85a53400 r5:84e60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a59d80 INFO: task kworker/1:947:6226 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 Exception stack(0xe00a9d28 to 0xe00a9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 task:kworker/1:948 state:D stack:0 pid:6230 tgid:6230 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8595738c r4:85957000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad0 80239bb0 800e0113 ffffffff r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:6232 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85912f8c r4:85912c00 r4:85a53500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe00a9fb0 to 0xe00a9ff8) Workqueue: events bpf_prog_free_deferred [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:ddde2d80 r6:83018200 r5:85957b8c r4:85a49b00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a52080 INFO: task kworker/1:949:6235 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: bf746000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:84ca2f8c r4:84ca2c00 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:950:6236 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:950 state:D stack:0 pid:6236 tgid:6236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccedd84 r8:00000002 r7:60000113 r6:eccedd8c r5:84e64800 r4:84e64800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e64800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a52040 r5:85957f8c r4:85957c00 r10:00000000 r9:85a49b80 r8:80287e08 r7:ecce9e60 r6:85a53680 r5:84e64800 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:951:6237 blocked for more than 478 seconds. [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a52780 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84e65400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb8f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a84f8c r4:85a84c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a84f8c r4:85a49c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e65400 r8:85a49c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49c00 r8:80287e08 r7:eccede60 r6:85a53700 r5:84e65400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a52080 INFO: task kworker/1:951:6237 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eb81b000 r5:85a8438c r4:85a84000 r4:00000001 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:953:6241 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:953 state:D stack:0 pid:6241 tgid:6241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd01d84 r8:00000002 r7:60000013 r6:ecd01d8c r5:84e66c00 r4:84e66c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e66c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd01e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018205 r8:84e66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8478c r4:85a84400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8478c r4:85a49d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e66c00 r8:85a49d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49d00 r8:80287e08 r7:eccf1e60 r6:85a53800 r5:84e66c00 r4:85a52240 r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r5:800e0113 r4:80239bb0 r4:e00a9dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:954:6242 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:954 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85a84b8c r4:85a84800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a52880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec577000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8538c r4:85a85000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8538c r4:85a49e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f8c00 r8:85a49e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49e00 r8:80287e08 r7:eccf1e60 r6:85a53900 r5:859f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd0dfb0 to 0xecd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a52440 INFO: task kworker/1:955:6244 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:00001000 r4:e0065000 r4:00000001 INFO: task kworker/1:956:6247 blocked for more than 479 seconds. r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85a49e80 r4:85a52600 Exception stack(0xe00a9d28 to 0xe00a9d70) 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ecd21d84 r8:00000002 r7:60000113 r6:ecd21d8c r5:859fa400 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8578c r4:85a85400 r7:ddde2d80 r6:83018200 r5:85a8578c r4:85a49f00 r4:00000001 Workqueue: events bpf_prog_free_deferred r5:800e0113 r4:80239bb0 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a85f8c r4:85a85c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a85f8c r4:85a49f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859fbc00 r8:85a49fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a49f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49f80 r8:80287e08 r7:ecd19e60 r6:85a53a80 r5:859fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a52840 INFO: task kworker/1:958:6250 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c0ee8000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:959:6252 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:959 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd29d84 r8:00000002 r7:60000113 r6:ecd29d8c r5:859fc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd29e08 r5:85a8638c r4:85a86000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8638c r4:85a5e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859fc800 r8:85a5e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e000 r8:80287e08 r7:ecd25e60 r6:85a53b00 r5:859fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd29fb0 to 0xecd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a52b00 INFO: task kworker/1:959:6252 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: c11ea000 ecef1000 00000001 80239b98 7f14d000 00000001 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8591338c r4:85913000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:593 state:D stack:0 pid:6257 tgid:6257 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8591378c r4:85913400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859fe000 r8:85a53cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a53c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53c80 r8:80287e08 r7:eca31e60 r6:85a53d00 r5:859fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a5fa00 INFO: task kworker/0:593:6257 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c172b000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r4:84fbcc80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85913f8c r4:85a53d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859fec00 r8:85a53dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a53d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a53d80 r8:80287e08 r7:eca31e60 r6:85a53e00 r5:859fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd2dfb0 to 0xecd2dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800e0113 r4:80239bb0 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Call trace: r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859fb000 r8:85a5e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:6263 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd31e08 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a53f00 r8:80287e08 r7:ecd2de60 r6:85a53f80 r5:859f9800 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:84fbcc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ecd39d84 r8:00000002 r7:60000113 r6:ecd39d8c r5:84e63c00 r4:00000000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r5:84ca2f8c r4:84ca2c00 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:961:6267 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:961 state:D stack:0 pid:6267 tgid:6267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd3dd84 r8:00000002 r7:60000113 r6:ecd3dd8c r5:852c8000 r4:852c8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd3de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a594c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a86f8c r4:85a5e100 r4:85a5e100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r5:00001000 r4:e0065000 r4:00000001 r4:84fc3840 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r7:ddde2d80 r6:83018200 r5:85a86b8c r4:85a5e180 r10:00000000 r9:85a5e180 r8:80287e08 r7:ecd3de60 r6:85a61180 r5:852c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a56c80 INFO: task kworker/1:962:6269 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c23c3000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd45e08 r7:ddde2d80 r6:83018200 r5:85a8778c r4:85a5e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) task:kworker/1:964 state:D stack:0 pid:6273 tgid:6273 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:852ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r7:ddde2d80 r6:83018200 r5:85a8738c r4:85a5e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ca400 r8:85a5e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e280 r8:80287e08 r7:ecd45e60 r6:85a61280 r5:852ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859cf2c0 INFO: task kworker/1:964:6273 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c27d9000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a87b8c r4:85a5e300 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 r4:84fc3840 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd51d84 r8:00000002 r7:60000113 r6:ecd51d8c r5:852cbc00 r4:852cbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a516c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb87000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a8878c r4:85a5e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a511c0 INFO: task kworker/1:966:6277 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c2d5d000 ecef1000 00000001 80239b98 7f14d000 00000001 r4:00000000 r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r7:ddde2d80 r6:83018200 r5:85a87f8c r4:85a5e400 r10:61c88647 r9:852cd400 r8:85a5e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd65d84 r8:00000002 r7:60000113 r6:ecd65d8c r5:852cc800 r4:852cc800 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cc800 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51580 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8838c r4:85a88000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8838c r4:85a5e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecd65fb0 to 0xecd65ff8) Call trace: r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 Exception stack(0xe00a9fb0 to 0xe00a9ff8) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd69e08 r7:ddde2d80 r6:83018200 r5:85a8978c r4:85a5e500 r10:61c88647 r9:852ce000 r8:85a5e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:84fbcc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85ac8c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd71e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51840 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a88b8c r4:85a88800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a88b8c r4:85a5e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac8c00 r8:85a5e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e580 r8:80287e08 r7:ecd69e60 r6:85a61580 r5:85ac8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd71fb0 to 0xecd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a51540 INFO: task kworker/1:970:6285 is blocked on a mutex likely owned by task kworker/0:181:3662. 9d20: c3364000 ecef1000 00000001 80239b98 7f14d000 00000001 r5:00001000 r4:e0065000 Exception stack(0xe00a9fb0 to 0xe00a9ff8) task:kworker/1:971 state:D stack:0 pid:6286 tgid:6286 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51980 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbaf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a88f8c r4:85a88c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a88f8c r4:85a5e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac9800 r8:85a5e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e600 r8:80287e08 r7:ecd69e60 r6:85a61600 r5:85ac9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd75fb0 to 0xecd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a51640 INFO: task kworker/1:971:6286 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c3692000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:6289 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd81d84 r8:00000002 r7:60000113 r6:ecd81d8c r5:85ac8000 r4:85ac8000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac8000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51a80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85ac8000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8938c r4:85a89000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8938c r4:85a5e680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac8000 r8:85a5e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e680 r8:80287e08 r7:ecd69e60 r6:85a61680 r5:85ac8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd81fb0 to 0xecd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a519c0 INFO: task kworker/1:972:6289 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 Exception stack(0xe00a9d28 to 0xe00a9d70) 9d60: 80230ad0 80239bb0 800e0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:00000000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ca2f8c r4:84ca2c00 r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:6291 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:973 state:D stack:0 pid:6291 tgid:6291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd89d84 r8:00000002 r7:60000013 r6:ecd89d8c r5:85aca400 r4:85aca400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aca400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd89e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51d40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a89b8c r4:85a89800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a89b8c r4:85a5e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aca400 r8:85a5e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e700 r8:80287e08 r7:ecd69e60 r6:85a61700 r5:85aca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd89fb0 to 0xecd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a51880 INFO: task kworker/1:973:6291 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c3c04000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:6294 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd95d84 r8:00000002 r7:60000113 r6:ecd95d8c r5:85acd400 r4:85acd400 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acd400 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd95e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51e40 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbed000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a89f8c r4:85a89c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a89f8c r4:85a5e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acd400 r8:85a5e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e780 r8:80287e08 r7:ecd89e60 r6:85a61780 r5:85acd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a51bc0 INFO: task kworker/1:974:6294 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c3c04000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:6296 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:975 state:D stack:0 pid:6296 tgid:6296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd9dd84 r8:00000002 r7:60000113 r6:ecd9dd8c r5:85ace000 r4:85ace000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ace000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd9de08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51f80 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85ace000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbfb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8a38c r4:85a8a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8a38c r4:85a5e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ace000 r8:85a5e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e800 r8:80287e08 r7:ecd95e60 r6:85a61800 r5:85ace000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd9dfb0 to 0xecd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a51c40 INFO: task kworker/1:975:6296 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c421e000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:976:6298 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:976 state:D stack:0 pid:6298 tgid:6298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecda5d84 r8:00000002 r7:60000113 r6:ecda5d8c r5:85acec00 r4:85acec00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acec00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56900 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85acec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8a78c r4:85a8a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8a78c r4:85a5e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acec00 r8:85a5e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e880 r8:80287e08 r7:ecd9de60 r6:85a61880 r5:85acec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a51e00 INFO: task kworker/1:976:6298 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c4672000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:977:6300 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:977 state:D stack:0 pid:6300 tgid:6300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdadd84 r8:00000002 r7:60000013 r6:ecdadd8c r5:85acbc00 r4:85acbc00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acbc00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdade08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e0c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc1d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8ab8c r4:85a8a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8ab8c r4:85a5e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acbc00 r8:85a5e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e900 r8:80287e08 r7:ecda5e60 r6:85a61900 r5:85acbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdadfb0 to 0xecdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e000 INFO: task kworker/1:977:6300 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c4672000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:6301 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdb1d84 r8:00000002 r7:60000013 r6:ecdb1d8c r5:85acb000 r4:85acb000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acb000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e340 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85acb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc2b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8af8c r4:85a8ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8af8c r4:85a5e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acb000 r8:85a5e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5e980 r8:80287e08 r7:ecdade60 r6:85a61980 r5:85acb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e000 INFO: task kworker/1:978:6301 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c4672000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:6303 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:6303 tgid:6303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdb9d84 r8:00000002 r7:60000013 r6:ecdb9d8c r5:852d0000 r4:852d0000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852d0000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb9e08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e880 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8bf8c r4:85a8bc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8bf8c r4:85a5ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852d0000 r8:85a5ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ea00 r8:80287e08 r7:ecdb1e60 r6:85a61a00 r5:852d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb9fb0 to 0xecdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e1c0 INFO: task kworker/1:979:6303 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c4c89000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:980:6304 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:6304 tgid:6304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdbdd84 r8:00000002 r7:60000113 r6:ecdbdd8c r5:852d0c00 r4:852d0c00 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852d0c00 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e440 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc3f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8b38c r4:85a8b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8b38c r4:85a5ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852d0c00 r8:85a5eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ea80 r8:80287e08 r7:ecdb9e60 r6:85a61a80 r5:852d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdbdfb0 to 0xecdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e380 INFO: task kworker/1:980:6304 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c53fa000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:6307 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:6307 tgid:6307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdcdd84 r8:00000002 r7:60000013 r6:ecdcdd8c r5:852d3000 r4:852d3000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852d3000 r4:8291a680 [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53cd8>] (schedule_preempt_disabled) from [<81a563d4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a560d4>] (__mutex_lock.constprop.0) from [<81a568a0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdcde08 r4:00000000 [<81a5688c>] (__mutex_lock_slowpath) from [<81a568e0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a568a4>] (mutex_lock) from [<804e78f4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e5c0 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:852d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8b78c r4:85a8b400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8b78c r4:85a5eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852d3000 r8:85a5eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5eb00 r8:80287e08 r7:ecdb9e60 r6:85a61b00 r5:852d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdcdfb0 to 0xecdcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6e240 INFO: task kworker/1:981:6307 is blocked on a mutex likely owned by task kworker/0:181:3662. task:kworker/0:181 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53d3c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:844d4800 r8:80200be4 r7:e00a9d5c r6:ffffffff r5:844d4800 r4:00000000 [<81a53cfc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe00a9d28 to 0xe00a9d70) 9d20: c53fa000 ecef1000 00000001 80239b98 7f14d000 00000001 9d40: 82ac15a0 7f14d000 ecef1000 8280c928 82ac21c4 e00a9da4 e00a9da8 e00a9d78 9d60: 80230ad0 80239bb0 800e0113 ffffffff r5:800e0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c8>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b8>] (__purge_vmap_area_lazy) from [<804e7a70>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e00a9dc0 r5:e00a9e08 r4:e00a9dc0 [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e788c>] (_vm_unmap_aliases) from [<804eb7c8>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fc8540 r4:00000000 [<804eb660>] (vfree) from [<8054b22c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1fc>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ca2f8c r4:84ca2c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ca2f8c r4:84fbcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84fbccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fbcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fbcc80 r8:80287e08 r7:e009de60 r6:84fbcd00 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fc3840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:6308 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:6308 tgid:6308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52984>] (__schedule) from [<81a53908>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52984>] (__schedule) from [<81a53908>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd35d84 r8:00000002 r7:60000113 r6:ecd35d8c r5:85970000 r4:85970000 [<81a538dc>] (schedule) from [<81a53cf0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970000 r4:8291a680